VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack
09
Jul
2025

VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack

A sophisticated supply chain attack has compromised ETHcode, a popular Visual Studio Code extension for Ethereum development, through a malicious…

TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions
09
Jul
2025

TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions

A new Android vulnerability called TapTrap that allows malicious apps to bypass the operating system’s permission system without requiring any…

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
09
Jul
2025

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

Jul 09, 2025The Hacker NewsSecurity Operations / Automation Run by the team at workflow orchestration and AI platform Tines, the…

Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data
09
Jul
2025

Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data

A sophisticated cyberattack orchestrated by Chinese state-sponsored hackers has exposed vulnerabilities in the global cybersecurity infrastructure, targeting critical COVID-19 research…

Hackers Exploit IIS Machine Keys to Breach Organizations
09
Jul
2025

Hackers Exploit IIS Machine Keys to Breach Organizations

A sophisticated campaign by an initial access broker (IAB) group exploiting leaked Machine Keys from ASP.NET websites to gain unauthorized…

Lessons from Ireland on closing the cybersecurity talent gap
09
Jul
2025

OpenAI’s Investment for AI Cyber Threats. Next-Generation Security Awareness Training.

Adaptive Security provides one platform to prevent GenAI social engineering. The cybersecurity startup is upgrading the human firewall for deepfake personas,…

Chrome and Edge logos displayed side by side
09
Jul
2025

Millions of people spied on by malicious browser extensions in Chrome and Edge

Researchers have discovered a campaign that tracked users’ online behavior using 18 browser extensions available in the official Chrome and…

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
09
Jul
2025

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme

Jul 09, 2025Ravie LakshmananMalware / Cyber Crime The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on…

Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions
09
Jul
2025

Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions

Splunk has released critical security updates addressing multiple Common Vulnerabilities and Exposures (CVEs) in third-party packages across Enterprise versions 9.4.3,…

Google Launches Advanced Protection for Vulnerable Users via Chrome on Android
09
Jul
2025

Google Launches Advanced Protection for Vulnerable Users via Chrome on Android

Google has announced the expansion of its Advanced Protection Program to Chrome on Android, providing enhanced security features specifically designed…

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)
09
Jul
2025

Microsoft fixes critical wormable Windows flaw (CVE-2025-47981)

For July 2025 Patch Tuesday, Microsoft has released patches for 130 vulnerabilities, among them one that’s publicly disclosed (CVE-2025-49719) and…

Podcast: Container storage challenges and how to overcome them
09
Jul
2025

Podcast: Container storage challenges and how to overcome them

In this podcast, we talk to Pure Storage’s Venkat Ramakrishnan about customer challenges when dealing with containers and storage and…