CISO Intelligence: Critical Vulnerabilities Demand Action - February 12, 2026
Collecting recent security intelligence...
# CISO Intelligence: AI Security Roundup - February 12, 2026
This week's developments in AI security and cybersecurity automation, curated for security executives.
AI Security Incidents
Google says hackers are abusing Gemini AI for all attacks stages
*Source: BleepingComputer | [Read More](https://www.bleepingcomputer.com/news/security/google-says-hackers-are-abusing-gemini-ai-for-all-attacks-stages/)*
Google Threat Intelligence Group (GTIG) has published a new report warning about AI model extraction/distillation attacks, in which private-sector firms and researchers use legitimate API access to systematically probe models and replicate their logic and reasoning. [...]
AI Keywords: AI model
Proactive strategies for cyber resilience with Wazuh
*Source: BleepingComputer | [Read More](https://www.bleepingcomputer.com/news/security/proactive-strategies-for-cyber-resilience-with-wazuh/)*
Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM and XDR unify visibility, detection, and automated response to strengthen proactive defense. [...]
AI Keywords: automated
Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
*Source: Help Net Security | [Read More](https://www.helpnetsecurity.com/2026/02/11/ivanti-epmm-sleeper-webshell/)*
<p>A massive wave of exploitation attempts has followed the disclosure of CVE-2026-1281, a critical pre-authentication Ivanti EPMM vulnerability, the Shadowserver Foundation has warned. Some of it is automated scanning for vulnerable systems, but according to Greynoise and Defused, a suspected initi...
AI Keywords: automated
Emerging AI Threats
North Korea's UNC1069 Hammers Crypto Firms With AI
*Source: Dark Reading | [Read More](https://www.darkreading.com/threat-intelligence/north-koreas-unc1069-hammers-crypto-firms)*
In moving away from traditional banks to focus on Web3 companies, the threat actor is leveraging LLMs, deepfakes, legitimate platforms, and ClickFix.
AI Keywords: LLM
AI Security Tools
Picking an AI red teaming vendor is getting harder
*Source: Help Net Security | [Read More](https://www.helpnetsecurity.com/2026/02/12/owasp-ai-red-teaming-vendors/)*
<p>Vendor noise is already a problem in traditional security testing. AI red teaming has added another layer of confusion, with providers offering everything from consulting engagements to automated testing platforms. Many buyers still struggle to tell whether a vendor can test real-world AI system ...
AI Keywords: automated
Conclusion
AI continues to reshape the threat landscape. Security leaders must balance adoption benefits with emerging risks.
---
Analysis based on 5 sources | Generated: 2026-02-12T09:02:24.782790*

