This Week in Security: State Malware, State Hardware Bans, and Stuxnet before Stuxnet was Cool Hackaday 3d
Two researchers stumble on pre-Stuxnet malware that may have targeted Iran's nuclear program CyberNews 8d
Researchers unearth industrial sabotage malware that predated Stuxnet by 5 years CSO Magazine 4d Stuxnet Malware Cyber Security All sources
Hackers impersonate Microsoft Teams help desk to breach corporate networks The Record 7d Microsoft Teams Malware Microsoft All sources
Dozens of Open VSX extension clones linked to GlassWorm malware SecurityWeek 6d GlassWorm Open VSX Cyber Security All sources
Greece’s top prosecutor’s decision to not reopen the spyware case triggers political outrage Keep Talking Greece 7d Malware Greece Balkans All sources
More fake extensions linked to GlassWorm found in Open VSX code marketplace CSO Magazine 4d Programming Spyware Cyber Security
SAP npm Packages Compromised to Harvest Developer and CI/CD Secrets Cyber Security News 5d SAP Top Tech Brands Cyber Security
Lazarus Hackers Attacking macOS Users With ‘Mach-O Man’ Malware Kit Cyber Security News 5d Apple Advanced Persistent Threats Spyware
Minecraft players targeted by lofystealer using node.js loader and in-memory browser injection Cyber Security News 6d Minecraft Browsers Spyware
Cisco moves to acquire Astrix Security to tackle non-human identity risks SecurityWeek 6h Cisco AI Top Tech Brands
“Legitimate” phishing: how attackers weaponize Amazon SES to bypass email security Securelist 14h Amazon Amazon Web Services Phishing
Amazon SES increasingly abused in phishing to evade detection BleepingComputer.com 5h Amazon Phishing Technology
How one fake Google ad can silently steal your Mac’s passwords MakeUseOf 5h Google Technology (UK) Top Internet Brands