Open source has a malware problem, and it's getting worse
10
Jul
2025

Open source has a malware problem, and it’s getting worse

Sonatype has published its Q2 2025 Open Source Malware Index, identifying 16,279 malicious open source packages across major ecosystems such…

Preventing the growing costs of repeat and duplicate bug bounty submissions
10
Jul
2025

Preventing the growing costs of repeat and duplicate bug bounty submissions

Within the bug bounty industry, duplicate submissions refer to when two or more researchers report the same issue or vulnerability….

New “Opossum” Attack Breaches Secure TLS by Injecting Malicious Messages
10
Jul
2025

New “Opossum” Attack Breaches Secure TLS by Injecting Malicious Messages

A newly discovered man-in-the-middle exploit dubbed “Opossum” has demonstrated the unsettling ability to compromise secure communications over Transport Layer Security…

Cynomi’s platform updates enable service providers to prioritize their security efforts
10
Jul
2025

Cynomi’s platform updates enable service providers to prioritize their security efforts

Cynomi has launched new business impact analysis (BIA) and business continuity planning (BCP) features. Designed to help cybersecurity professionals identify…

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
10
Jul
2025

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

A high-severity security flaw has been disclosed in ServiceNow’s platform that, if successfully exploited, could result in data exposure and…

Massive Scraper Botnet of 3,600+ Devices Targets US and UK Websites
10
Jul
2025

Massive Scraper Botnet of 3,600+ Devices Targets US and UK Websites

GreyNoise has discovered an undiscovered version of a scraper botnet with more than 3,600 distinct IP addresses worldwide, which is…

Lepide Protect detects, prioritizes, and revokes excessive permissions
10
Jul
2025

Lepide Protect detects, prioritizes, and revokes excessive permissions

In a move set to redefine the way organizations manage data access and implement zero trust, Lepide launched Lepide Protect, an…

New Tool Automates GitHub Device Code Phishing Attacks
10
Jul
2025

New Tool Automates GitHub Device Code Phishing Attacks

Security researchers revealed the dangers of GitHub Device Code Phishing—a technique that leverages the OAuth 2.0 Device Authorization Grant flow….

What EU's PQC roadmap means on the ground
10
Jul
2025

What EU’s PQC roadmap means on the ground

In this Help Net Security interview, David Warburton, Director at F5 Labs, discusses how the EU’s Post-Quantum Cryptography (PQC) roadmap…

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data
10
Jul
2025

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data

A severe security vulnerability in McDonald’s AI-powered hiring system has exposed the personal information of potentially 64 million job applicants…

McDonald’s AI Hiring Bot Exposed with ‘123456’ Password — Millions of Job Seekers’ Data at Risk
10
Jul
2025

McDonald’s AI Hiring Bot Exposed with ‘123456’ Password — Millions of Job Seekers’ Data at Risk

A shocking security vulnerability in McDonald’s AI-powered hiring system has exposed the personal information of millions of job applicants, after…

Fake online stores look real, rank high, and trap unsuspecting buyers
10
Jul
2025

Fake online stores look real, rank high, and trap unsuspecting buyers

Shopping on a fake online store can lead to more than a bad purchase. It could mean losing money, having…