Cybersecurity Wiretap #64: From Weaponized Pull Requests to Hidden IIS Modules with a Focus on Stealth and Supply Chain Abuse (week of 07/07/2025) AndySvints · Posted on July 14, 2025July 14, 2025