Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack | Cybersecurity
Oct 24, 2025Ravie LakshmananDevOps / Malware Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft…
Read moreThousands of online stores at risk as SessionReaper attacks spread | Malware
Early September, a security researcher uncovered a new vulnerability in Magento, an open-source e-commerce platform used by thousands of online retailers, and its commercial counterpart Adobe Commerce. It sounds like…
Read moreMeta boosts scam protection on WhatsApp and Messenger | Malware
Vulnerable Facebook Messenger and WhatsApp users are getting more protection thanks to a move from the applications’ owner, Meta. The company has announced more safeguards to protect users (especially the…
Read moreNorth Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets | Cybersecurity
Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the…
Read moreWhy Organizations Are Abandoning Static Secrets for Managed Identities | Cybersecurity
Oct 23, 2025The Hacker NewsDevOps / Data Protection As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the…
Read moreOver 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw | Cybersecurity
Oct 23, 2025Ravie LakshmananData Breach / Vulnerability E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento…
Read moreZero-click Dolby audio bug lets attackers run code on Android and Windows devices | Malware
Researchers from Google’s Project Zero discovered a medium-severity remote code execution (RCE) vulnerability that affects multiple platforms, including Android (Samsung and Pixel devices) and Windows. Remote code execution means an attacker could run programs on…
Read moreIran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign | Cybersecurity
Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute…
Read moreOver 100 Chrome extensions break WhatsApp’s anti-spam rules | Malware
Recent research by Socket’s Threat Research Team uncovered a massive, coordinated campaign flooding the Chrome Web Store with 131 spamware extensions. These add-ons hijack WhatsApp Web—the browser version of WhatsApp—to…
Read moreChinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch | Cybersecurity
Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East…
Read moreWhy You Should Swap Passwords for Passphrases | Cybersecurity
Oct 22, 2025The Hacker NewsData Breach / Enterprise Security The advice didn’t change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords…
Read moreTP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution | Cybersecurity
Oct 22, 2025Ravie LakshmananVulnerability / Network Security TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary…
Read moreYou can poison AI with just 250 dodgy documents | Malware
Researchers have shown how you can corrupt an AI and make it talk gibberish by tampering with just 250 documents. The attack, which involves poisoning the data that an AI…
Read moreMeta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams | Cybersecurity
Oct 21, 2025Ravie LakshmananCryptocurrency / Encryption Meta on Tuesday said it’s launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it’s…
Read moreWindows update breaks USB support in recovery mode | Malware
We usually tell our faithful readers to install updates as soon as possible, but this time there’s an exception. Microsoft’s October security update has disabled USB mice and keyboards in…
Read moreSecuring AI to Benefit from AI | Cybersecurity
Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and…
Read moreGoogle Identifies Three New Russian Malware Families Created by COLDRIVER Hackers | Cybersecurity
Oct 21, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an…
Read moreHome Depot Halloween phish gives users a fright, not a freebie | Malware
We received a timely phishing email pretending to come from Home Depot. It claimed we’d won a Gorilla Carts dump cart (that’s a sort of four-wheeled wheelbarrow for anyone unfamiliar)—and…
Read moreChinese gangs made over $1 billion targeting Americans with scam texts | Malware
We regularly warn our readers about new scams and phishing texts. Almost everyone gets pestered with these messages. But where are all these scam texts coming from? According to an…
Read moreFive New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets | Cybersecurity
Oct 20, 2025Ravie LakshmananThreat Intelligence / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, officially…
Read moreWhat does Google know about me? (Lock and Code S06E21) | Malware
This week on the Lock and Code podcast… Google is everywhere in our lives. It’s reach into our data extends just as far. After investigating how much data Facebook had…
Read moreF5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More | Cybersecurity
It’s easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show that long-term, silent breaches are becoming…
Read moreA week in security (October 13 – October 19) | Malware
October 17, 2025 – While Prosper says no funds or accounts were accessed, the stolen data could lead to targeted phishing and identity theft. October 17, 2025 – It might…
Read moreMSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems | Cybersecurity
Oct 20, 2025Ravie LakshmananCyber Espionage / National Security China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a “premeditated” cyber attack targeting the National Time Service…
Read moreEuropol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide | Cybersecurity
Oct 19, 2025Ravie LakshmananSIM Swapping / Cryptocurrency Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry…
Read moreNew .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs | Cybersecurity
Oct 18, 2025Ravie LakshmananThreat Intelligence / Cybercrime Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented…
Read moreSilver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT | Cybersecurity
The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote…
Read moreUnder the engineering hood: Why Malwarebytes chose WordPress as its CMS | Malware
It might surprise some that a security company would choose WordPress as the backbone of its digital content operations. After all, WordPress is often associated with open-source plugins, community themes,…
Read moreNorth Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware | Cybersecurity
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group…
Read moreProsper data breach puts 17 million people at risk of identity theft | Malware
Peer-to-peer lending marketplace Prosper detected unauthorized activity on their systems on September 2, 2025. It published an FAQ page later that month to address the incident. During the incident, the…
Read more