A threat actor named WhiteCobra has infiltrated the Visual Studio Code marketplace and Open VSX registry with 24 malicious extensions targeting developers using VSCode, Cursor, and Windsurf editors . Campaign overview The ongoing campaign represents a sophisticated operation that…
Category: CySecurity News – Latest Information Security and Hacking Incidents
500GB Leak Marks Largest Exposure of Great Firewall’s Internal Operations
There has been a significant breach of one of the world’s most sophisticated censorship systems, the Great Firewall, which is considered one of the most tightly controlled systems. This breach has led to the largest data leak to date…
Villager: AI Software That Makes Hacking Easier
A new penetration testing framework named Villager is drawing international attention for its unusual mix of traditional hacking tools and artificial intelligence. Released in July 2025 through the Python Package Index, the tool has already surpassed 10,000 downloads in…
DevOps data breaches expose Microsoft, Schneider Electric, Mercedes-Benz, and New York Times
Source code forms the backbone of every digital enterprise, and platforms such as GitHub and Atlassian are trusted to safeguard this critical data. Yet, organizations must remember that under the Shared Responsibility Model, users retain accountability for the security…
Chat Control Faces Resistance from VPN Industry Over Privacy Concerns
The European Union is poised at a decisive crossroads when it comes to shaping the future of digital privacy and is rapidly approaching a landmark ruling which will profoundly alter the way citizens communicate online. A final vote on…
RBI Proposes Smartphone Lock Mechanism for EMI Defaults
RBI is considering allowing lenders to remotely lock smartphones purchased on credit when borrowers default on EMIs, aiming to curb bad debt while igniting concerns over consumer rights and digital access harms . What’s proposed Reuters reporting indicates RBI…
Identity governance must extend to physical access in critical infrastructure security
In cybersecurity, much attention is often placed on firewalls, multi-factor authentication, and digital access controls, but in sensitive sectors such as utilities, energy, airports, pharmaceutical plants, and manufacturing, the challenge extends well beyond digital defenses. Physical access plays a…
New VMScape Attack Raises Concerns Over Virtual Machine Security
Researchers have revealed a new attack technique called VMScape that can break the security barriers between virtual machines and the systems that host them. This discovery is substantial because virtualization forms the backbone of today’s cloud computing environment, where multiple…
Court Upholds $46.9 Million Penalty Against Verizon for Sharing Location Data
A U.S. federal appeals court has ruled that Verizon must pay a $46.9 million penalty for unlawfully selling customers’ real-time location information. The decision closes the door on Verizon’s argument that its practices were legal, reinforcing the Federal Communications…
EU Data Act Compliance Deadline Nears With Three Critical Takeaways
A decisive step forward in shaping the future of Europe’s digital economy has been taken by the regulation of harmonised rules for fair access to and use of data, commonly known as the EU Data Act, which has moved…
CLOUD Act Extends US Jurisdiction Over Global Cloud Data Across Microsoft, Google, and Amazon
That Frankfurt data center storing your business files or the Singapore server holding your personal photos may not be as secure from U.S. oversight as you think. If the provider is Microsoft, Amazon, Google, or another U.S.-based tech giant,…
FTC Launches Formal Investigation into AI Companion Chatbots
The Federal Trade Commission has announced a formal inquiry into companies that develop AI companion chatbots, focusing specifically on how these platforms potentially harm children and teenagers. While not currently tied to regulatory action, the investigation seeks to understand…
Where Does Your Personal Data Go When You Ditch a Device?
When people upgrade their phones, laptops, or tablets, the old devices often end up in trade-in programs or at electronic waste collection points. But what happens to the personal information stored on those devices after they leave your hands?…
Massive NPM Supply-Chain Attack Reaches Millions, Nets Hackers Less Than $1,000
The largest supply-chain attack in NPM ecosystem history impacted approximately 10% of cloud environments after attackers compromised maintainer Josh Junon’s account through a phishing campaign, yet generated minimal profits for the perpetrators. The attack began when Junon fell victim…
Restaurant Brands International faces cybersecurity flaws as ethical hackers expose data security risks
Restaurant Brands International (RBI), the parent company of Burger King, Tim Hortons, and Popeyes, has come under scrutiny after two ethical hackers uncovered major cybersecurity flaws across its digital systems. The researchers, known by their handles BobDaHacker and BobTheShoplifter,…
South Korea Intensifies Crackdown with Return of Casino Crime Suspects
A sweeping move which underscores both the scale of organised gambling operations in Asia as well as the increasing threat of cross-border crime is South Korean authorities dismantling an illicit casino network that funnelled the equivalent of KRW 44…
U.S. Sanctions Cybercrime Networks Behind $10 Billion in Fraud
The United States Treasury has announced sweeping sanctions against criminal groups accused of running large-scale online scams that cost Americans more than $10 billion last year. The targeted networks, mainly operating out of Myanmar and Cambodia, are accused not…
Cybercriminals Hide Malware in Trusted Tools and File Formats, HP Wolf Security Warns
Attackers are increasingly disguising malicious activity inside everyday business tools and file formats that employees and IT teams typically trust. According to the latest HP Wolf Security Threat Insights Report (Q2 2025), threat actors are refining their strategies to…
Clorox Blames $380M Breach on Service Desk Social Engineering, Sues Cognizant
In August 2023, the Scattered Spider group orchestrated a devastating social engineering attack against Clorox that resulted in approximately $380 million in damages, demonstrating how a simple phone call can lead to catastrophic business disruption . Modus operandi The…
Blackpool Credit Union Cyberattack Exposes Customer Data in Cork
A Cork-based credit union has issued a warning to its customers after a recent cyberattack exposed sensitive personal information. Blackpool Credit Union confirmed that the breach occurred late last month and subsequently notified members through a formal letter. Investigators…