Category: Data Breaches

Your blog category

  • GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

    GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

    Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem.
    The extensions in question, which are still available for download, are listed below –

    ai-driven-dev.ai-driven-dev (3,402 downloads)
    adhamu.history-in-sublime-merge (4,057

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

    Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

    Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network traffic to glean details about model conversation topics despite encryption protections under certain circumstances.
    This leakage of data exchanged between humans and streaming-mode language models could pose serious risks to

  • Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware

    Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware

    A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade” Android spyware dubbed LANDFALL in targeted attacks in the Middle East.
    The activity involved the exploitation of CVE-2025-21042 (CVSS score: 8.8), an out-of-bounds write flaw in the “libimagecodec.quram.so” component that could allow remote attackers to execute arbitrary

  • From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

    From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

    A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues.
    The organization, according to a report from Broadcom’s Symantec and Carbon Black teams, is “active in attempting to influence U.S. government

  • Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

    Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

    A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems.
    According to software supply chain security company Socket, the packages were published in 2023 and 2024 by a user named “shanhai666” and are designed to run malicious code after specific trigger dates in August 2027 and

  • Enterprise Credentials at Risk – Same Old, Same Old?

    Enterprise Credentials at Risk – Same Old, Same Old?

    Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she’s just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are laughing all the way to their dark web

  • Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

    Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

    Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform and demand ransoms to remove the negative comments.
    The approach is designed to tackle a common practice called review bombing, where online users intentionally post negative user reviews in an

  • Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

    Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

    Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, vibe-coded.
    Secure Annex researcher John Tuckner, who flagged the extension “susvsex,” said it does not attempt to hide its malicious functionality. The extension was uploaded on

  • Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

    Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

    A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities.
    The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned.
    “InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link

  • From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

    From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

    Introduction
    Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement.
    Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI organizations in