News The Hacker News GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUsOver 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHubFortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code ExecutionSecuring Data in the AI EraCritical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the WildIranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for CybercriminalsCISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target EnterprisesCritical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ DownloadsFake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and DiscordFour Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and HarrodsNew ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS AppWhat Security Leaders Need to Know About AI Governance for SaaSAMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUsServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLsGold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to TargetsDoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod MalwareU.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker SchemeHow To Automate Ticket Creation, Device Identification and Threat Triage With TinesChinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks Wired Security News 4 Arrested Over Scattered Spider Hacking SpreeMetadata Shows the FBI’s ‘Raw’ Jeffrey Epstein Prison Video Was Likely ModifiedDHS Tells Police That Common Protest Activities Are ‘Violent Tactics’McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’Android May Soon Warn You About Fake Cell TowersThe Person in Charge of Testing Tech for US Spies Has ResignedTrump Officials Want to Prosecute Over the ICEBlock App. Lawyers Say That’s UnconstitutionalCBP Wants New Tech to Search for Hidden Data on Seized PhonesThe Promise and Peril of Digital Security in the Age of DictatorshipA Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right NowIdentities of More Than 80 Americans Stolen for North Korean IT Worker ScamsICE Rolls Facial Recognition Tools Out to Officers' PhonesUS Supreme Court Upholds Texas Porn ID Law'They're Not Breathing': Inside the Chaos of ICE Detention Center 911 CallsTelegram Purged Chinese Crypto Scam Markets—Then Watched as They RebuiltTaiwan Is Rushing to Make Its Own Drones Before It's Too LateWhat Satellite Images Reveal About the US Bombing of Iran's Nuclear SitesTruth Social Crashes as Trump Live-Posts Iran BombingIsrael Says Iran Is Hacking Security Cameras for SpyingIran’s Internet Blackout Adds New Dangers for Civilians Amid Israeli Bombings Help Net Security News Week in review: Microsoft fixes wormable RCE bug on Windows, check for CitrixBleed 2 exploitationCritical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)Behind the code: How developers work in 2025Bitwarden MCP server equips AI systems with controlled access to credential workflowsToken Security launches two features to secure AI agents and machine identitiesWhere policy meets profit: Navigating the new frontier of defense tech startupsEmployees are quietly bringing AI to work and leaving security behindFinancial firms are locking the front door but leaving the back openNew infosec products of the week: July 11, 2025Four arrested in connection with M&S, Co-op ransomware attacksRuckus network management solutions riddled with unpatched vulnerabilitiesSigma360 AI Investigator Agent reduces manual reviewsCynomi’s platform updates enable service providers to prioritize their security effortsLepide Protect detects, prioritizes, and revokes excessive permissionsWhat EU’s PQC roadmap means on the groundFake online stores look real, rank high, and trap unsuspecting buyersOpen source has a malware problem, and it’s getting worseC-suites step up on OT cybersecurity, and it’s paying offGlobal software supply chain visibility remains critically lowAlertMedia Incident Response improves coordination and visibility into resolving incidents پلیس فتا سرقت دادههای خصوصی کاربران با لینکهای جعلی و دانلود کلیپ مناسبتیفریب تبلیغات غیرواقعی در فضای مجازی را نخوریدصفحه جعلي اينستاگرام، بستري براي کينهتوزي از خانم جوانورود به لینک جعلی ؛ دو میلیارد ریال برای شاکی آب خوردنشست تعاملی پلیس فتا با مدیر کل صدا و سیما استان سیستان و بلوچستان فروش خودرو بهانه ای شد برای کلاهبرداری در سایت دیوار دستگیری کلاهبرداران ۴۰ میلیاردی در خراسان شمالیهشدار! وام کمبهره یا وام فوری میتونه یه تله باشه!مایکروسافت آسیبپذیری روز صفر مورد استفاده برای جاسوسی سایبری را برطرف کردساخت یک دستگاه هک موبایل با پیکسل و کالی نتهانتر