Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack | Cybersecurity

Oct 24, 2025Ravie LakshmananDevOps / Malware Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft…

Read more

Thousands of online stores at risk as SessionReaper attacks spread | Malware

Early September, a security researcher uncovered a new vulnerability in Magento, an open-source e-commerce platform used by thousands of online retailers, and its commercial counterpart Adobe Commerce. It sounds like…

Read more

Meta boosts scam protection on WhatsApp and Messenger | Malware

Vulnerable Facebook Messenger and WhatsApp users are getting more protection thanks to a move from the applications’ owner, Meta. The company has announced more safeguards to protect users (especially the…

Read more

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets | Cybersecurity

Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the…

Read more

Why Organizations Are Abandoning Static Secrets for Managed Identities | Cybersecurity

Oct 23, 2025The Hacker NewsDevOps / Data Protection As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the…

Read more

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw | Cybersecurity

Oct 23, 2025Ravie LakshmananData Breach / Vulnerability E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento…

Read more

Zero-click Dolby audio bug lets attackers run code on Android and Windows devices | Malware

Researchers from Google’s Project Zero discovered a medium-severity remote code execution (RCE) vulnerability that affects multiple platforms, including Android (Samsung and Pixel devices) and Windows. Remote code execution means an attacker could run programs on…

Read more

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign | Cybersecurity

Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute…

Read more

Over 100 Chrome extensions break WhatsApp’s anti-spam rules | Malware

Recent research by Socket’s Threat Research Team uncovered a massive, coordinated campaign flooding the Chrome Web Store with 131 spamware extensions. These add-ons hijack WhatsApp Web—the browser version of WhatsApp—to…

Read more

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch | Cybersecurity

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East…

Read more

Why You Should Swap Passwords for Passphrases | Cybersecurity

Oct 22, 2025The Hacker NewsData Breach / Enterprise Security The advice didn’t change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords…

Read more

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution | Cybersecurity

Oct 22, 2025Ravie LakshmananVulnerability / Network Security TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary…

Read more

You can poison AI with just 250 dodgy documents | Malware

Researchers have shown how you can corrupt an AI and make it talk gibberish by tampering with just 250 documents. The attack, which involves poisoning the data that an AI…

Read more

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams | Cybersecurity

Oct 21, 2025Ravie LakshmananCryptocurrency / Encryption Meta on Tuesday said it’s launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it’s…

Read more

Windows update breaks USB support in recovery mode | Malware

We usually tell our faithful readers to install updates as soon as possible, but this time there’s an exception. Microsoft’s October security update has disabled USB mice and keyboards in…

Read more

Securing AI to Benefit from AI | Cybersecurity

Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and…

Read more

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers | Cybersecurity

Oct 21, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an…

Read more

Home Depot Halloween phish gives users a fright, not a freebie | Malware

We received a timely phishing email pretending to come from Home Depot. It claimed we’d won a Gorilla Carts dump cart (that’s a sort of four-wheeled wheelbarrow for anyone unfamiliar)—and…

Read more

Chinese gangs made over $1 billion targeting Americans with scam texts | Malware

We regularly warn our readers about new scams and phishing texts. Almost everyone gets pestered with these messages. But where are all these scam texts coming from? According to an…

Read more

Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets | Cybersecurity

Oct 20, 2025Ravie LakshmananThreat Intelligence / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, officially…

Read more

What does Google know about me? (Lock and Code S06E21) | Malware

This week on the Lock and Code podcast… Google is everywhere in our lives. It’s reach into our data extends just as far. After investigating how much data Facebook had…

Read more

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More | Cybersecurity

It’s easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show that long-term, silent breaches are becoming…

Read more

A week in security (October 13 – October 19) | Malware

October 17, 2025 – While Prosper says no funds or accounts were accessed, the stolen data could lead to targeted phishing and identity theft. October 17, 2025 – It might…

Read more

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems | Cybersecurity

Oct 20, 2025Ravie LakshmananCyber Espionage / National Security China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a “premeditated” cyber attack targeting the National Time Service…

Read more

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide | Cybersecurity

Oct 19, 2025Ravie LakshmananSIM Swapping / Cryptocurrency Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry…

Read more

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs | Cybersecurity

Oct 18, 2025Ravie LakshmananThreat Intelligence / Cybercrime Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented…

Read more

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT | Cybersecurity

The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote…

Read more

Under the engineering hood: Why Malwarebytes chose WordPress as its CMS | Malware

It might surprise some that a security company would choose WordPress as the backbone of its digital content operations. After all, WordPress is often associated with open-source plugins, community themes,…

Read more

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware | Cybersecurity

The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group…

Read more

Prosper data breach puts 17 million people at risk of identity theft | Malware

Peer-to-peer lending marketplace Prosper detected unauthorized activity on their systems on September 2, 2025. It published an FAQ page later that month to address the incident. During the incident, the…

Read more