📅 Weekly Security Briefing — Feb 16–22, 2026
Here’s your clean, high-signal roundup of the biggest cybersecurity developments from the past week — from cutting-edge AI threats to targeted phishing and critical device security patches. 🔍 Google Gemini Prompt Injection & ‘Delayed Tool Invocation’ Exploit What happened: Security researchers demonstrated how indirect prompt injection can be used to trick Google’s Gemini assistant into leaking private data and performing actions by embedding hidden instructions within trusted inputs (e.g., calendar invites or text). This method — often referred to as delayed tool invocation — conditions the hidden instruction to run later when the user interacts with the AI, enabling exfiltration of calendar or email content and other workflows. 🔗 https://www.techrepublic.com/article/news-google-gemini-indirect-prompt-injection-attack/ 🇷🇺 Russian State-Linked Actors Conduct Sophisticated Microsoft 365 Phishing Campaigns What happened: A series of phishing and device-code authentication abuse campaigns linked to Russian state-aligned threat groups (including activity attributed to organizations in the SVR network like APT29 and variants) continue to target Microsoft 365 and Azure AD authentication flows. Adversaries use social engineering — including OAuth device code phishing — to steal tokens and gain persistent access to corporate tenants. 🔗 https://www.securityweek.com/russian-state-hackers-target-organizations-with-device-code-phishing/ 🍎 CISA Adds Apple iOS USB Restricted Mode Bypass Zero-Day to KEV Catalog What happened: The U.S. Cybersecurity and Infrastructure Security Agency confirmed that CVE-2025-24200, a vulnerability allowing attackers with physical access to bypass USB Restricted Mode on locked Apple devices, has been added to its Known Exploited Vulnerabilities (KEV) catalog. The flaw impacts iOS and iPadOS devices and was patched by Apple after reports of sophisticated targeted attacks.