Chrome Extensions Leaking Your Data

Chrome Extensions Are Leaking Your Data – and the Keys to the Kingdom Symantec researchers found that dozens of popular Chrome extensions—some with hundreds of thousands of installs—send telemetry over unencrypted HTTP and even hard-code API keys (Google Analytics, Azure, AWS, Tenor, crypto services) directly in their JavaScript. Examples include SEMRush Rank, Browsec VPN, MSN […]

Read More

MS helps India break up AI-driven tech-support scam

Microsoft helps India break up AI-driven tech-support scam On 6 June 2025 India’s Central Bureau of Investigation (CBI), working with Microsoft and Japan’s National Police Agency, raided 19 sites in Delhi, Haryana and Uttar Pradesh (Operation Chakra V). Six suspects were arrested and two illegal call-centres shut down. The syndicate posed as Microsoft support, targeting […]

Read More

Gen-AI at Work

Gen-AI at Work: Why Banning ChatGPT Won’t Save Your Data The Hacker News article explains why simply blocking public generative-AI tools is a poor defence against data loss. Zscaler’s ThreatLabz team saw AI/ML traffic jump 36-fold in 2024 and counted more than 800 different AI apps inside enterprises. When companies ban ChatGPT-style services, employees often […]

Read More

Database Dump Exposes 184 Million Logins

Security researcher Jeremiah Fowler uncovered an unsecured ElasticSearch database holding 184 million login records—usernames and plain-text passwords for services such as Apple, Google, Facebook, Microsoft and many more. A spot-check of 10,000 entries revealed hundreds of government email addresses from at least 29 countries, including the UK and the US, raising national-security concerns. The trove, […]

Read More

Ransomware hits West Lothian schools

Interlock, a ransomware gang, breached the education network of Scotland’s West Lothian Council. The council first said no data had been taken, but after Interlock dumped files online it admitted that “a small percentage” of data was stolen. Personal information on teachers, parents and carers—including scanned passports and driving licences—has appeared on the criminals’ leaks […]

Read More

Hackers are ringing your office

Authorities have issued an alert to law firms about Luna Moth (also known as Silent Ransom Group, Chatty Spider and Storm-0252), an extortion gang that has been running sophisticated “callback phishing” attacks since 2022. Victims first receive innocuous emails—often about fake invoices or subscription renewals—asking them to telephone a customer-service number. Once on the call, […]

Read More

Two decades of penetration testing

I’ve been elbow-deep in other people’s networks for nineteen years now, and if there’s one constant it’s that the shiny toys always turn up long before the basics are nailed down. The EDR / MDR / XDR mirage Over the last half-decade every board slide has the same checkbox: “SOC in place – ✅”. They […]

Read More

hackers league table of EDR tools

The Conti ransomware group published an “EDR Tier List” on X (formerly Twitter), grading well-known Endpoint Detection and Response tools from S Tier (hardest to evade) down to “LOL” Tier (trivial to bypass). A surprise entry in the bottom tier is Microsoft Defender for Endpoint (MDE), which the gang says is easy to sidestep in […]

Read More

Oracle Cloud Credential Leak

CISA Issues Warning Over Oracle Cloud Credential Leak The US Cybersecurity and Infrastructure Security Agency (CISA) has warned organisations that a January breach of two obsolete Oracle Cloud servers may expose millions of credentials. • Oracle privately told customers that its core Oracle Cloud Infrastructure (OCI) was not compromised, but attackers accessed usernames from legacy […]

Read More