top of page

ALL POSTS

Coupang Data Breach Exposes 33.7 Million South Korean Accounts

Key Findings Coupang, a major e-commerce company in South Korea, has suffered a massive data breach affecting over 33.7 million accounts - more than half of the country's population. The breach was initially detected on November 18, 2025, when suspicious activity was observed on around 4,500 accounts. Further investigation revealed that the breach actually dated back to late June 2025 and had compromised the personal information of nearly the entire Coupang user base. Exposed

Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration

Key Findings Sonesta International Hotels partners with AccuKnox to deploy Zero Trust Integrated Application and Cloud Security for Microsoft Azure. Sonesta's goals include addressing multi-cloud misconfigurations, achieving compliance conformance, and automating the findings and ticketing lifecycle. AccuKnox was selected due to its comprehensive features, ease of deployment, ease of use, third-party integrations, and ability to provide real-time security against advanced zer

Crypto Crackdown: $28M Seized in Swiss Cryptomixer Takedown

Key Findings Authorities seized the Cryptomixer cryptocurrency mixing service, seizing $28 million in Bitcoin and disrupting a platform used by cybercriminals to launder over $1.5 billion since 2016. The operation, part of "Operation Olympia," involved coordinated efforts by Europol, Eurojust, and law enforcement agencies from Germany and Switzerland. Cryptomixer, accessible on the clear and dark web, used pooling and randomized withdrawal methods to obscure the origins of fu

BreachLock Named a Leader in 2026 GigaOm Radar Report for Penetration Testing as a Service (PTaaS) for Fourth Consecutive Year

Key Findings BreachLock named a Leader and Fast Mover in the 2025 GigaOm Radar Report for Penetration Testing as a Service (PTaaS) for the third consecutive year The report evaluated 16 top PTaaS providers based on key feature capabilities, enterprise business requirements, deployment models, and other important decision-making criteria BreachLock scored highly in all evaluated categories, except for crowdsourcing pentesters, which the company does not offer BreachLock's in-h

Kevin Lancaster Joins the usecure Board to Accelerate ...

Key Findings Kevin Lancaster, a leading channel expert and tech entrepreneur, has joined the board of usecure as a Non-Executive Director. Lancaster's appointment is expected to accelerate usecure's growth in the North American channel, building on the company's existing momentum and partnerships. usecure provides human risk management solutions for the channel, helping MSPs and internal IT teams reduce cyber risk through behavior change and data-driven insights. The company

Contagious Interview campaign expands with 197 npm Packages spreading new OtterCookie malware

Key Findings North Korea-linked actors behind the Contagious Interview campaign have uploaded 197 new malicious npm packages to distribute a new version of the OtterCookie malware. The Contagious Interview campaign, active since November 2023, targets software developers on Windows, Linux, and macOS, with a focus on those working in crypto and Web3. Attackers pose as recruiters on platforms like LinkedIn and use social engineering tactics, including fake job interviews and tr

North Korean Hackers Release Updated OtterCookie Malware via Malicious npm Packages

Key Findings North Korean threat actors behind the Contagious Interview campaign have flooded the npm registry with 197 more malicious packages since last month These packages have been downloaded over 31,000 times and are designed to deliver a variant of OtterCookie malware The malware attempts to evade sandboxes and virtual machines, profiles the machine, and establishes a command-and-control (C2) channel to provide the attackers with remote shell access and capabilities to

Zombie Protocol: How NTLM Flaws Like CVE-2024-43451 Are Haunting 2025

Key Findings Despite being over two decades old, the NTLM authentication protocol remains a critical security liability in 2025. Cybercriminals are actively exploiting newly discovered vulnerabilities to launch sophisticated attacks across the globe. One of the most alarming vulnerabilities is CVE-2024-43451, which allows attackers to steal a user's NTLMv2 hash with virtually no interaction. The vulnerability abuses the MSHTML engine to trigger an NTLM authentication attempt

OpenAI Assures Customers After Mixpanel Breach Exposes Some API User Data

Key Findings OpenAI confirmed a data breach involving its third-party analytics provider Mixpanel The breach exposed limited API user metadata like names, emails, locations, and browser info No passwords, API keys, chat content, or payment data were involved Regular ChatGPT users were not affected, only those interacting with the OpenAI API Background OpenAI, the company behind the popular AI assistant ChatGPT, has confirmed a data breach involving Mixpanel, a third-party ana

One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM

Key Findings Gartner recognized One Identity as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM) Placement as a Visionary reflects the company's emphasis on simplified security, accelerated adoption, and intelligence-driven identity protection Visionary classification validates One Identity's strategy of blending AI-driven administration, flexible deployment, and customer-first design Background According to Gartner, Visionaries are "noted

Hidden Danger: Chrome Extension Exploits Solana Wallets

Key Findings Cybersecurity researchers have discovered a malicious Chrome extension named "Crypto Copilot" that injects hidden Solana transfer fees into Raydium swap transactions. The extension silently appends an extra transfer instruction to each swap, siphoning a minimum of 0.0013 SOL or 0.05% of the trade amount to an attacker-controlled wallet. The malicious behavior is concealed through obfuscation techniques, and the extension's user interface only shows the legitimate

Critical Flaw in Ray AI Platform Exploited via Safari and Firefox (CVE-2025-62593)

Key Findings A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-62593, has been discovered in the Ray framework. The vulnerability allows attackers to execute arbitrary code on a developer's machine via a malicious website or advertisement, targeting users of Safari and Firefox. The attack exploits a flaw in how Ray handles local API requests, bypassing the framework's defense mechanism that relies on checking the User-Agent header. Background Ray is a

Microsoft Teams Guest Chat Flaw Exposes Users to Malware Attacks

Key Findings Microsoft Teams' "Guest Access" feature allows attackers to bypass security controls like Microsoft Defender for Office 365, creating a "protection-free zone" for malware delivery. Attackers can easily create basic Microsoft 365 accounts without security features and use them to send phishing links and malware to guest users. A recent Microsoft feature that allows any Teams user to start a chat with any email address makes it even easier for attackers to lure vic

INE Extends Cross-Skilling Initiatives

Key Findings INE, the leading provider of hands-on IT and Cybersecurity training, announced a significant expansion of its learning portfolio. The new content includes courses, hands-on labs, and certification prep resources designed to help professionals cross-skill and upskill. INE's training model emphasizes hands-on learning, scenario-based exercises, and progressive skill-building paths. INE is offering limited-time pricing during the Black Friday period, providing reduc

Perplexity's AI-Powered Shopping: Personalized Recommendations and Instant Checkout

Key Findings: Perplexity has launched a new AI-powered shopping experience with personalized product search and Instant Buy integration with PayPal. The system retains user context and preferences to provide tailored product recommendations, presented as formatted cards with pros/cons analyses. Purchases can be completed directly through Perplexity using PayPal, without the need to visit individual retailer websites. Perplexity aims to address concerns about drawing traffic a

Fluent Bit Flaws Expose Cloud to RCE and Stealthy Telemetry Tampering

Key Findings Critical authentication bypass vulnerability (CVE-2025-12969) in the `in_forward` plugin allows attackers to connect to Fluent Bit forwarders without authentication Tag key spoofing flaw (CVE-2025-12978) enables attackers to control a record's tag, bypassing configuration security Tag injection vulnerability (CVE-2025-12977) allows attackers to inject problematic characters into tags, leading to log corruption and output injection Path traversal vulnerability (CV

Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams

Key Findings: Detego Global, the company behind the award-winning Unified Digital Forensics Platform, has launched Detego Case Manager for DFIR, a powerful case management platform for digital forensics and incident response (DFIR) teams. The new platform addresses the real-world challenges of managing high-volume, complex digital investigations across multiple locations and touchpoints, whether on-scene or in the laboratory. Detego Case Manager for DFIR delivers full-spectru

CISA Warns of Spyware Targeting Signal and WhatsApp Users

Key Findings CISA has issued an alert warning of threat actors actively using commercial spyware and remote access trojans (RATs) to target users of mobile messaging apps like Signal and WhatsApp. The attackers employ sophisticated social engineering and targeting techniques to deliver spyware and gain unauthorized access to victims' messaging apps, enabling further device compromise. The targeting appears opportunistic but often focuses on high-value individuals such as gove

Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Key Findings Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags. Successful exploitation of the flaws could enable attackers to disrupt cloud services, manipu

Elite Cyber Veterans Launch Blast Security with $10M to Revolutionize Cloud Security

Key Findings Blast Security, a cybersecurity startup, has launched from stealth with a $10 million seed round co-led by 10D and MizMaa Ventures. The company is founded by industry veterans from Solebit (acquired by Mimecast) and elite IDF units. Blast is introducing a new operating model for cloud security with its first-of-its-kind Preemptive Cloud Defense Platform. The platform replaces reactive response with continuous prevention, turning native cloud control into a preven

  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page