Latest security news
- Open-source attacks move through normal development workflows
- Product showcase: 2FAS Auth – Free, open-source 2FA for iOS
- NSA Publishes New Zero Trust Implementation Guidelines
- ShinyHunters flip the script on MFA in new data theft attacks
- Notepad++ Update Hijacking Linked to Hosting Provider Compromise
- How state-sponsored attackers hijacked Notepad++ updates
- Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks
- Microsoft sets a path to switch off NTLM across Windows
- Android RAT Uses Hugging Face to Host Malware
- Former Google Engineer Found Guilty of Stealing AI Secrets
- Open-source AI pentesting tools are getting uncomfortably good
- Where NSA zero trust guidance aligns with enterprise reality
- Labyrinth Chollima Evolves into Three North Korean Hacking Groups
- New AI-Developed Malware Campaign Targets Iranian Protests
- National Crime Agency and NatWest Issue Joint Warning Over Invoice Fraud Threat
- Google Disrupts Extensive Residential Proxy Networks
- Operation Winter SHIELD: FBI Issues Call to Arms for Organizations to Improve Cybersecurity
- France Fines National Employment Agency €5m Over 2024 Data Breach
- New CISA Guidance Targets Insider Threat Risks
Software development relies on a steady flow of third-party code, automated updates, and fast release cycles. That environment has made the software supply chain a routine point of entry for attackers, with malicious activity blending into normal build and deployment processes. A recent ReversingLabs study documents how these conditions played out across open source ecosystems during 2025, with attackers leaning on scale, trust, and automation to spread malware and harvest credentials. Share of 2025 open-source …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.