Gemini Enterprise No-Click Flaw Exposes Sensitive Data
(darkreading.com)
61.
62.
Ransomware IAB abuses EDR for stealthy malware execution
(bleepingcomputer.com)
63.
Microsoft "mitigates" Windows LNK flaw exploited as zero-day
(bleepingcomputer.com)
64.
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
(darkreading.com)
65.
66.
ShadyPanda browser extensions amass 4.3M installs in malicious campaign
(bleepingcomputer.com)
67.
GreyNoise launches free scanner to check if you're part of a botnet
(bleepingcomputer.com)
68.
Google exposes BadAudio malware used in APT24 espionage campaigns
(bleepingcomputer.com)
69.
GlobalProtect VPN portals probed with 2.3 million scan sessions
(bleepingcomputer.com)
70.
W3 Total Cache WordPress plugin vulnerable to PHP command injection
(bleepingcomputer.com)
71.
73.
Cursor Issue Paves Way for Credential-Stealing Attacks
(darkreading.com)
74.
150,000 Packages Flood NPM Registry in Token Farming Campaign
(darkreading.com)
77.
78.
Malicious NuGet packages drop disruptive 'time bombs'
(bleepingcomputer.com)
79.
Supply chain attacks are exploiting our assumptions
(news.ycombinator.com)
81.
Gootloader malware is back with new tricks after 7-month break
(bleepingcomputer.com)
82.
The Top 3 Browser Sandbox Threats That Slip Past Modern Security Tools
(bleepingcomputer.com)
83.
Fake Solidity VSCode extension on Open VSX backdoors developers
(bleepingcomputer.com)
84.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
85.
The security paradox of local LLMs
(news.ycombinator.com)
86.
CISA: High-severity Windows SMB flaw now exploited in attacks
(bleepingcomputer.com)
87.
Malicious crypto-stealing VSCode extensions resurface on OpenVSX
(bleepingcomputer.com)
89.
Hackers can steal 2FA codes and private messages from Android phones
(arstechnica.com)
90.
CRDT and SQLite: Local-First Value Synchronization
(news.ycombinator.com)
Today's top topics:
meta
google
openai
amazon
child safety
new mexico
daredevil
android
social media
samsung