Malicious AI Extensions with 1.5 Million VS Code Installs Steal Developer Source Code
Researchers have uncovered two malicious extensions for Microsoft Visual Studio Code that claim to provide AI coding assistance while secretly stealing developer data. Key Points: Two malicious VS Code extensions have 1.5 million combined installs. The extensions capture sou
Microsoft's Cooperation with Law Enforcement on BitLocker Keys Sparks Data Control Concerns
Microsoft's recent actions in supplying BitLocker encryption keys to law enforcement have ignited debate over enterprise data security and control. Key Points: Microsoft provided BitLocker keys in compliance with a law enforcement request. This raises significant questions a
DOGE Admits Potential Misuse of Social Security Data Amid Ongoing Privacy Concerns
The Department of Justice has revealed that operatives from DOGE may have shared Social Security data inappropriately, raising serious constitutional and privacy issues. Key Points: DOJ court filings suggest DOGE may have shared Social Security data with unauthorized groups. D
The Open Source Security Testing Methodology Manual (OSSTMM) 3
The Open Source Security Testing Methodology Manual (OSSTMM) 3 provides a scientific framework for verifying operational security across physical, human, and digital channels. This methodology uses test cases to generate factual metrics rather than relying on anecdotal evidence
Ransomware Gang’s Mistake Helps Recovery for 12 U.S. Firms
A recent error by a ransomware group has resulted in the unintended recovery of data for twelve companies targeted in a cyber attack. Key Points: Ransomware gang’s operational slip allowed data recovery for multiple firms. The affected companies were involved in various sect
Tesla Hacked: 37 Zero-Days Unveiled at Pwn2Own Automotive 2026
Security researchers have successfully hacked Tesla's infotainment system, demonstrating 37 zero-day vulnerabilities and earning substantial rewards at Pwn2Own Automotive 2026. Key Points: Synacktiv Team exploits Tesla's infotainment system, earning $516,500. The competition h
Minnesota DHS Data Breach Exposes Information of Nearly 304K Individuals
A significant data breach at the Minnesota Department of Human Services has compromised the records of over 300,000 individuals, raising concerns about data security and user access. Key Points: Unauthorized access occurred to the MnChoices system, managed by FEI Systems. 30
Jordanian Pleads Guilty to Selling Access to 50 Corporate Networks in US Court
A Jordanian man has admitted to selling illegal access to dozens of enterprise networks, highlighting ongoing issues with cybercrime. Key Points: Feras Khalil Ahmad Albashiti sold access to compromised networks of at least 50 companies. The defendant operated under the alias '
Cyber incidents again rank as the leading global business risk heading into 2026
Cyber incidents again rank as the leading global business risk heading into 2026, while artificial intelligence surged into second place, according to the latest Allianz Risk Barometer released by Allianz Commercial. Cyber risk held the top position for a fifth consecutive year,
Tennessee Man Admits to Hacking Supreme Court, AmeriCorps Systems
Nicholas Moore has pleaded guilty to multiple counts of hacking the U.S. Supreme Court’s filing system and illegally accessing government intranet data. Key Points: Moore accessed the Supreme Court's filing system over 25 days. Illegally retrieved sensitive information from
ICE List Wiki Faces DDoS Attack After Agent Data Leak Attempt
A DDoS attack has crippled the ICE List Wiki, which planned to release sensitive information about US federal agents tied to Immigration and Customs Enforcement. Key Points: The DDoS attack was a coordinated effort to prevent the release of identities of 4,500 ICE agents. A
China-Linked APT UAT-8837 Targets North American Critical Infrastructure via Sitecore Zero-Day Exploit
A China-aligned advanced persistent threat actor has exploited a critical zero-day vulnerability in Sitecore to infiltrate crucial infrastructure sectors in North America, raising alarm among cybersecurity experts. Key Points: UAT-8837 is a China-linked APT actor targeting cr
Join the #1 Cybersecurity Community on Digg!
Whether you're a security professional, IT administrator, ethical hacker, or simply passionate about protecting digital assets, you've found your home. Our Cybersec community brings together experts and enthusiasts to share the latest security news, threat intelligence, vulner
You’ve reached the end of the feed.
Roll credits.