The latest AI news we announced in February
Google’s February AI roundup says the month was focused on showing how AI can solve practical problems at a global scale, especially through partnerships and investments announced at its AI Impact Summit in India. It also highlights several product updates, including Nano Banana 2 for faster high-quality image generation, Lyria 3 for music creation, and Flow for generating, editing, ....
Gemini 3.1 Flash-Lite: Built for intelligence at scale
Google is introducing Gemini 3.1 Flash-Lite as its fastest and cheapest model in the Gemini 3 line, aimed at developers who need to handle large amounts of work without spending much per request. It is rolling out in preview through the Gemini API in Google AI Studio and through Vertex AI for enterprise users. The post says the model ....
New details on Apple-Google AI deal revealed, including Gemini changes: report
Apple’s AI partnership with Google is reportedly much broader than previously understood, giving Apple deep access to Gemini inside its own data centers and the ability to build smaller, customized versions of the model for specific Siri tasks. That would let Apple use distillation to create faster, more efficient models that can run on devices instead of relying as ....
Nano Banana 2: Combining Pro capabilities with lightning-fast speed
Google’s post introduces Nano Banana 2, also called Gemini 3.1 Flash Image, as a new image model that tries to combine the higher-end capabilities of Nano Banana Pro with much faster generation and editing speed. It says the model is better at using real-world knowledge, following detailed instructions, generating readable text inside images, and keeping characters or objects consistent ....
How we’re reimagining Maps with Gemini
The post says Google Maps is getting two major Gemini-powered upgrades, one focused on discovering places and the other on driving. A new feature called Ask Maps lets users ask detailed, real-world questions in a conversational way, then returns personalized recommendations on a map, using fresh local information, reviews, and a person’s saved preferences to help turn ideas into ....
New ways to create faster with Gemini in Docs, Sheets, Slides and Drive
The post says Google is expanding Gemini across Docs, Sheets, Slides, and Drive to help paid Google AI Pro and Ultra subscribers get from a blank page to a finished project faster. In Docs, Gemini can draft and revise content using relevant files, emails, and web information, while also matching a user’s writing style or the format of an ....
Bringing state-of-the-art Gemini translation capabilities to Google Translate
Google is rolling out major upgrades to Google Translatepowered by its advanced Gemini AI models to deliver more natural, accurate translations, especially for idioms, slang, and nuanced phrases. The update introduces state-of-the-art Gemini translation capabilities for text across Search and the Translate app, improving how meaning and context are captured. It also launches a beta real-time speech-to-speech translation experience ....
Rethinking the Cybersecurity Arms Race: When 80% of Ransomware Attacks are AI-Driven
Summary: AI is transforming cyber threats, making attacks faster, adaptive, and autonomous. Analysis of 2,800 ransomware incidents in 2023–2024 found that over 80% were AI-enabled, showing how quickly adversaries have adopted these tools. Groups like LockBit, RansomHub, and BlackCat now deploy AI for reconnaissance, malware generation, deepfake-driven deception, and automated ransom negotiations. Capabilities include intelligent file targeting, polymorphic evasion, ....
MIT Sloan’s “80% of ransomware attacks now use artificial intelligence
Summery: Researchers studied 2,800 ransomware attacks and found that about 80% involved artificial intelligence. Attackers are using AI in many ways: generating phishing content, creating malware, driving deepfake-based social engineering, cracking passwords, and bypassing CAPTCHA systems. The paper argues that just having AI tools for defense isn’t enough. Effective cybersecurity requires three defense layers: Automated hygiene (self-patching, zero-trust architecture, ....
Following Your Stolen Data Through The Dark Web
The Wired video “Following Your Stolen Data Through The Dark Web” explains what happens to personal and corporate information after a cyberattack. It describes how state-sponsored hackers, hacktivists, and criminal groups steal data for different purposes, from espionage to profit. The piece explores how stolen information flows through private networks and dark web marketplaces, where it is sold for ....
Android malware steals your card details and PIN to make instant ATM withdrawals
A new Android malware called NGate steals card details and PINs by abusing NFC features on infected phones. It tricks victims into tapping their physical card against the compromised device, capturing data and one-time codes used for instant ATM withdrawals. Criminals can then clone the card virtually and withdraw cash without needing physical access. The malware spreads through fake ....
Should you let Chrome store your driver’s license and passport?
Google Chrome now lets users store driver’s licenses and passports in its autofill feature, promising encryption and permission-based access. While the data is protected within the browser, experts warn that storing such sensitive details in Chrome increases risk if your Google account is hacked or malware gains access. Chrome’s large market share makes it a tempting target for attackers. ....
The Emergence of Autonomous Cyber Attacks: Analysis and Implications
In mid-November 2025, the report notes that Anthropic detected what appears to be one of the first autonomous AI-driven cyber-espionage campaigns, in which an AI agent (built using Claude Code) carried out most of a multi-stage attack with minimal human oversight. The document argues this marks a major shift: attackers may now scale operations across numerous targets at high ....
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
Researchers from the University of Vienna found a major flaw in WhatsApp’s contact-discovery feature that let them check tens of billions of phone numbers and extract about 3.5 billion registered user numbers, along with many users’ profile pictures and “about” texts. The weakness stemmed from minimal rate-limiting: they could probe roughly 100 million numbers per hour with no meaningful ....
Fake calendar invites are spreading. Here’s how to remove them and prevent more
The article reveals a surge in fake calendar invites used as phishing attacks, where scammers send events that can’t easily be deleted and often reappear through synced devices, aiming to trick users into calling a number, clicking a link, or attending a fraudulent meeting. It explains how to remove these from platforms like Outlook, Gmail, Android, iPhone, and Mac ....
Fortune 500 scrambles after Anthropic’s warning of automated cyberattacks
According to Axios, executives at major companies (including many in the Fortune 500) are scrambling after Anthropic warned that a Chinese state-sponsored hacker group used its AI agent tools (notably Claude Code) to automate parts of cyber-espionage campaigns. The incident signals a shift in cyber threat landscape, where malicious actors are increasingly harnessing AI agency and automation to scale ....
Holiday scams 2025: These common shopping habits make you the easiest target
The article reveals a surge in fake calendar invites used as phishing attacks, where scammers send events that can’t easily be deleted and often reappear through synced devices, aiming to trick users into calling a number, clicking a link, or attending a fraudulent meeting. It explains how to remove these from platforms like Outlook, Gmail, Android, iPhone, and Mac ....
Holiday shoppers targeted as Amazon and FBI warn of surge in account takeover attacks
Scammers are ramping up their attacks this holiday season, with FBI and Amazon warning of a surge in “account takeover” (ATO) fraud targeting shoppers. According to data from TransUnion, ATO incidents rose 21% from the first half of 2024 to the first half of 2025, and by 141% since the first half of 2021, while the FBI has logged ....
Millions at risk after nationwide CodeRED alert system outage and data breach
A ransomware attack on the CodeRED emergency alert system caused a nationwide outage and exposed personal data for millions of users, putting many communities at risk just as they rely on the service for urgent public warnings. The attackers stole customer information, including email addresses and passwords, which raised concerns about account security for anyone who reused those credentials ....
New ClickFix wave infects users with hidden malware in images and fake Windows updates
Researchers have uncovered a new wave of ClickFix attacks that trick Windows users into installing malware by faking legitimate system update screens and hiding malicious code in images. The scam begins with a full-screen browser page styled to look like the official “Windows Update” interface, prompting users to press Win+R, paste a command, and run it — a command ....
New Android malware lets criminals control your phone and drain your bank account
The article warns about a new strain of Android malware that gives criminals full control of an infected phone and direct access to a victim’s bank accounts. It spreads through fake apps and phishing messages that trick users into granting permissions, after which the malware can read texts, capture screen activity, steal login codes, and bypass security features. Once ....
Cloudflare says it’s investigating the outage that brought down Zoom and LinkedIn
Cloudflare reported that a brief but widespread outage interrupted access to major services like Zoom and LinkedIn after a faulty configuration change disrupted its firewall and related systems. The issue was quickly identified and resolved, with the company confirming it was not the result of a cyberattack. Even though the downtime lasted only minutes, it caused noticeable disruptions because ....
Update Chrome now: Google fixes 13 security issues affecting billions
The article reports that Google has released fixes for 13 security flaws that affect billions of users across Android, Chrome, and other widely used services. Several of the vulnerabilities were serious enough to allow attackers to gain elevated permissions, compromise data, or execute harmful code if a user opened a malicious file or link. Google credited external researchers for ....
Fighting fraud at scale with Mastercard Threat intelligence
he Axios sponsored article explains how Mastercard uses large-scale threat intelligence to fight fraud across the global payments ecosystem. By analyzing vast volumes of real-time transaction data and signals from banks, merchants, and networks, Mastercard can detect suspicious behavior patterns and stop fraud before it spreads. The approach relies on advanced analytics and AI to adapt quickly as criminals ....
How attackers use real IT tools to take over your computer
The article explains how attackers increasingly use legitimate IT tools to take over computers, making their intrusions harder to detect because the activity looks like normal system administration. Criminals often begin by stealing credentials through phishing or exploiting weak passwords, then use trusted remote management software to move through a network, install backdoors, and collect data. Since these tools ....

