When I use Channel4(UK) app, whenever a McDonald's advert comes on, the app will freeze on an image while subtitles and sound usually carry on -- causing me to need to close the app.

I call this the Channel4 "Google Play Services, Adobe, Location Tracking, Malicious Code" glitch. 👍

#Google #Android #Adobe #LocationTracking #MaliciousCode #Channel4UK #SpyCops

Developer gets 4 years for activating network “kill switch” to avenge his firing https://arstechni.ca/k4hK #maliciouscode #cybercrime #killswitch #developer #Policy
Developer gets 4 years for activating network “kill switch” to avenge his firing

Disgruntled developer was caught after naming the “kill switch” after himself.

Ars Technica

Un hacker ha inserito codice malevolo nella estensione Amazon Q per Visual Studio Code, progettata per assistere programmatori con AI generativa. Il codice, seppur difettoso e non dannoso, mirava a cancellare dati di sistema. Amazon ha rimosso la versione compromessa e invitato gli utenti ad aggiornare all’ultima release sicura.

https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/

#amazonavscode #hackerattack #maliciouscode #cybersecurity #softwareupdate

Amazon AI coding agent hacked to inject data wiping commands

A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code.

BleepingComputer

Ubuntu Security Flaw Lets Attackers Bypass Full Disk Encryption
#OMGUbuntu article: https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption

“Not all #Linux distributions are affected, such as #OpenSUSE_Tumbleweed.”

#Attackers with physical access to a Linux system can access a debug shell simply by entering the wrong #decryption #password several times in a row. On Ubuntu, they hit esc at the password prompt, punch in a few key combos and debug shell appears.
They can mount a USB drive with tools that let them modify the #initramfs (Initial RAM Filesystem – a temporary system run during boot to prep the main OS) to inject #maliciouscode, and then repack it – without tripping any #security flags.
Then, the next time the owner boots up their #laptop and enters their correct password, the code runs with elevated privileges to do whatever the #attacker wants.”

“Impactful though this exploit could be in the wild, there is no reason for most #Ubuntu users to be concerned about it.
This #vulnerability is what the security industry refer to as an '#evilmaidattack': it requires physical access to a #device to pull off.”

“Finally, protecting against this #vulnerability is easy. Users can simply tweak their system #kernel so that the #computer #reboots on failed password attempts, instead of providing a #debug shell.”

New Linux Security Flaw Uses Initramfs to Inject Malware

A newly found security flaw in Ubuntu could allow attackers with physical access to bypass full disk encryption. Learn how the attack works.

OMG! Ubuntu
Enhancing Security in VSCode Extensions: Addressing the Threat of Malicious Code

Explore the security risks of VSCode extensions and the threat of malicious code integration.

The DefendOps Diaries
🚨 Malicious commits target GitHub projects! A Texas researcher claims someone is impersonating him to sabotage his reputation. 🛑👨‍💻 #GitHub #CyberSecurity #MaliciousCode #TechNews #Hacking #DataBreach #OpenSource #IdentityTheft #CyberAttack #ResearchNews
Attack Techniques: Trojaned Clipboard

Today in “Attack techniques so stupid, they can’t possibly succeed… except they do!” — the trojan clipboard technique. The attacking website convinces the victim user …

text/plain

Article about XZ: As for which nation, Raiu names the usual suspects: China, Russia, North Korea. He says it’s still too early to know the true culprit.

Why is it never: United States of America. Because I can assure you, they are quite the player when it comes to building backdoors and other infiltration tech. Somehow they're always kept from the list.

Maybe they were less in need of it though, since they already have their ways by official means

#XZ #hack #maliciouscode #cybersecurity

Hunting for Malicious Code: The Dangers of WASP Stealer

WASP Stealer, for those of you who aren’t familiar, is an open-source malware created by loTus04 that is designed to steal sensitive information from a victim’s computer. It has several features that…

checkmarx-security