
Loading summary
A
From the CISO series, it's Cybersecurity Headlines these are the cybersecurity headlines for Thursday, September 11, 2025. I'm Sarah Lane. The NPM Incident Nothing to fret about In Wednesday's show, we passed along the story that an attacker compromised a developer's NPM account through a phishing email and and pushed malicious updates to 18 popular open source packages. The code attempted to hijack cryptocurrency transactions, but quick detection and response limited the damage. Malicious versions were live for about six hours and losses totaled roughly $1,000. Researchers called it the largest NPM attack to date and potential scope, but its actual impact appears to be minimal. Cursor Autorun flaw lets repositories execute code without consent A flaw in the cursor extension allows repositories to automatically execute code when a folder is opened in Visual Studio code. Even without developer consent. The Autorun feature can be exploited to steal API keys, alter files, or install persistent malware. With workspace trust off by default, opening a folder could compromise a developer's machine, experts warn. The show's developer tools are now part of the attack. Surface Senator Wyden urges FTC to probe Microsoft over Ascension hack US Senator Ron Wyden has urged the Federal Trade Commission to investigate Microsoft for gross cybersecurity negligence after the 2024 Ascension Hospital ransomware attack affected 5.6 million patients. Wyden alleges the breach started after a contractor clicked a malicious Bing link and that Microsoft's failure to disable the insecure RC4 encryption protocol contributed to the attack. Ascension reported $1.8 billion in operating losses and offered two years of identity protection to victims. Microsoft says RC4 use is minimal and plans to disable it by default in 2026. Apple's memory integrity Enforcement system thwarts spyware development Apple launched Memory integrity enforcement, or MIE, in its new iPhone 17, iPhone Air and A19 A19 Pro chips meant to block memory corruption exploits used by mercenary spyware. MIE combines hardware and OS checks via Enhanced Memory tagging extension or emte, verifying memory usage in real time to prevent unauthorized access. It doesn't fully eliminate spyware risk, but Apple says it does make attacks much harder and much more costly. Huge thanks to our sponsor Vanta. Do you know the status of your compliance controls right now? I'm talking right this second. We know that real time visibility is critical for security, but when it comes to our GRC programs, we rely on point end time checks. More than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across 35 frameworks like SoC2 and ISO 27001. They also centralize key workflows like policies, access reviews and reporting, and help you get security questionnaires done five times faster with AI. Now that is the new way to GRC. Get started today at vanta.com headlines eggstream malware breaches Philippine military systems bitdefender researcher Bogdan Zavadavsi said in a report shared with the Hacker News that Chinese state sponsored APT Group used a new fileless malware framework called Eggstream to compromise a Philippine military contractor. Eggstream operates entirely in memory using DLL sideloading and a multi stage payload to maintain persistence, steal data and perform reconnaissance. Its core backdoor eggstream agent includes a keylogger and supports 58 commands for lateral movement, privilege escalation and exfiltration. The malware also uses secondary implants and proxy tools to maintain access. Sales Loft Drift hack claims Tenable Qualys A supply chain attack on Sales Loft Drift AI Chat agent exposed OAuth tokens affecting multiple companies, including Tenable and Qualys. Attackers apparently accessed Sales Loft's GitHub account between March and June, then used the tokens to gain unauthorized access to Salesforce data, including customer contact information and and support requests. The attacks linked to the UNC 6395 group, exploited weak controls and tore exit notes. Both affected companies said their services remain operational and disabled the Drift integration to contain the breach. Jaguar Land Rover admits possible stolen data Jaguar Land Rover or JLR has confirmed some data may have been compromised in a cyber attack that halted production and at UK plants affecting around 1,000 vehicles daily. JLR's parent company, Tata Motors, hasn't said whether the data involved customers, suppliers or internal records. The attack was claimed by the Scattered Lapsus Hunters group and forced JLR to shut down IT networks while the National Cybersecurity center assists with recovery. Chile Hell macOS malware may have been live from for four years Chile Hell A modular Mac OS backdoor may have infected computers undetected for four years. This was first reported by Mandiant in 2023 and linked to the UNC4487 group. A developer signed version passed Apple's notarization back in 2021 and was publicly hosted on Dropbox Jamf Threat Labs. Researchers found that the malware persists via launch agents to launch daemons or shell profile modifications and evades detection using time stomping, multiple command and control protocols and a modular design. It can download updates, brute force passwords, exfiltrate data and execute additional payloads. Apple has revoked the associated developer certificates since we started CISO series, we've understood that selling cybersecurity products and is quite difficult. But it's compounded by the trend that large companies, not smaller ones, are often the first to adopt new solutions. But that adoption rate is also hampered by the risk averse nature of enterprise businesses. How can and do small startups cross that chasm? That's what we're trying to answer in our latest episode of Defense In Depth. Look for the episode the pattern of early adoption of security tools which Wherever you get your podcasts, if you have any thoughts from the news from today or about the show in general, be sure to reach out to us@feedbackisoseries.com we would love to hear from you. I am Sarah Lane reporting for the CISO series and you take care. Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines. It.
Host: Sarah Lane, CISO Series
Episode Theme:
A rapid-fire roundup of major current cybersecurity incidents and vulnerabilities, focusing on critical new attack vectors, recent breaches, and regulatory fallout impacting key players and industries.
Visit cisoseries.com for links to full stories and the latest updates.