Stanley Malware-as-a-Service: Malicious Browser Extensions Bypassing Store Security

High-tech control room with two operators monitoring cybersecurity threats.

A newly identified malware-as-a-service (MaaS) platform called Stanley is offering cybercriminals ready-made malicious browser extensions with a promise that they will pass moderation and be published in the official Chrome Web Store. This model dramatically increases the potential scale of compromise by turning trusted extension ecosystems into delivery channels for phishing and data theft. New … Read more

OnePlus Enables Hardware Anti-Rollback Protection in ColorOS, Putting Downgrades and Custom ROMs at Risk

Close-up of a circuit board showing a blown e-fuse and smoke.

Recent ColorOS builds for new OnePlus flagships introduce a strict hardware-backed Anti-Rollback Protection (ARB) mechanism that can effectively block downgrades and severely restrict the installation of older custom ROMs. According to reports from the modding community, attempting to revert to a previous firmware after installing these updates can in many cases lead to a fully … Read more

Malicious VS Code AI Extensions Steal Source Code in MaliciousCorgi Campaign

Hooded figure interacts with a glowing orb, surrounded by Chinese motifs and technology.

Two malicious AI coding assistant extensions have been discovered in the official Visual Studio Code Marketplace, collectively amassing roughly 1.5 million installations. Behind the promised productivity gains, the plugins were silently exfiltrating source code and sensitive developer data to remote servers located in China, underscoring the growing risk of supply chain attacks targeting developer tools. … Read more

1Password Introduces Built-In Phishing Protection for Suspicious and Look-Alike URLs

User startled by a phishing warning on a laptop in a dimly lit room.

Phishing remains one of the most effective techniques for stealing passwords, even among users who rely on password managers. In response, 1Password has rolled out a new built-in phishing protection mechanism designed to detect suspicious and look-alike URLs and warn users before they enter their credentials on a potentially fraudulent site. How 1Password’s New Anti-Phishing … Read more

Microsoft, BitLocker Recovery Keys, and Law Enforcement: Lessons from the Guam Investigation

FBI and police agents investigate a case with a suspect in a dimly lit room.

In 2024, Forbes reported that Microsoft supplied law enforcement with BitLocker recovery keys to unlock Windows laptops seized in a COVID‑19 unemployment fraud investigation on Guam. This appears to be the first publicly documented case where Microsoft provided keys protecting full‑disk encryption on user devices, and it raises important questions about the real level of … Read more

INC Ransomware: How Cyber Centaurs Recovered Victim Data from Attackers’ Own Backups

Cybernetic scene with a giant skull, hackers, and glowing data crates.

A rare incident response case has highlighted a critical blind spot in many organizations’ ransomware defenses. Cybersecurity firm Cyber Centaurs reports that it gained access to infrastructure linked to the INC ransomware operation, located encrypted backups stored by the threat actors themselves, and successfully restored data for 12 U.S. organizations previously hit by extortion attacks. … Read more

GitLab Patches Critical 2FA Bypass and DoS Vulnerabilities: What DevSecOps Teams Must Know

Tech professionals monitoring cybersecurity updates in a futuristic control room.

GitLab has shipped out-of-band security updates to address a critical two-factor authentication (2FA) bypass and several denial-of-service (DoS) vulnerabilities in GitLab Community Edition (CE) and Enterprise Edition (EE). Administrators of self-managed GitLab instances are strongly advised to deploy the patches without delay to reduce account takeover and service disruption risks. Critical GitLab 2FA bypass vulnerability … Read more

Luxshare Ransomware Attack Puts Apple and Global Electronics Supply Chain Under Scrutiny

Scenic view of a landscape featuring rice fields and a manufacturing facility.

A major ransomware incident at Chinese electronics manufacturer Luxshare, one of Apple’s key contract partners, is drawing attention to the fragility of cybersecurity in global technology supply chains. The RansomHub ransomware group claims it has compromised Luxshare’s internal systems and is threatening to publish sensitive data related to multiple global brands if a ransom is … Read more

Curl Ends HackerOne Bug Bounty After Surge of AI‑Generated Vulnerability Reports

Security analysts discussing AI-generated reports in a futuristic office.

The Curl project is phasing out its bug bounty program on HackerOne after a sharp rise in low‑quality, often AI‑generated vulnerability reports. Founder and lead developer Daniel Stenberg announced a staged shutdown, arguing that the program’s economics have been undermined by “AI slop” — superficially plausible but technically incorrect submissions that overwhelm a small security … Read more

PhantomCore Phishing Campaign Uses PowerShell Backdoor Against Russian and Belarusian Organizations

A split scene showing a businessman and a hacker with contrasting themes.

In January, security analysts observed a new wave of targeted phishing attacks linked to the PhantomCore threat group. According to researchers at F6, large-scale campaigns took place on 19 and 21 January, focusing on organizations across key sectors of the Russian economy — including housing and utilities, finance, aerospace, and major online marketplaces — with … Read more