Cybersecurity researchers have identified two malicious Chrome extensions that have collectively attracted over 900,000 users. These extensions, named 'Chat GPT for Chrome with GPT-5' and 'Claude Sonnet & DeepSeek AI,' are designed to steal conversations from OpenAI's ChatGPT and DeepSeek, along with users' browsing data. The stolen information is sent to servers controlled by the attackers. This incident raises significant concerns about user privacy and data security, as many individuals may unknowingly be exposing sensitive information through these extensions. Users are urged to remove these extensions immediately and review their online security practices to protect their data.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Hackread – Cybersecurity News, Data Breaches, AI, and More
Ledger has confirmed a data breach linked to its partner Global-e, which has resulted in the exposure of customer information. While sensitive data such as passwords and crypto recovery phrases were not compromised, users are now facing active phishing attempts that may target them using the leaked information. This incident raises concerns about the security of personal data in the cryptocurrency space and serves as a reminder for users to remain vigilant against phishing scams. Ledger is advising its customers to be cautious and verify any communications they receive that claim to be from the company or its partners. Staying alert is crucial as scammers may use this data to trick users into revealing more sensitive information.
Infosecurity Magazine
A new malware campaign known as PHALT#BLYX ClickFix is targeting the hospitality sector, exploiting social engineering tactics and the MSBuild.exe tool. This multi-stage attack has been specifically designed to infiltrate hospitality organizations, putting sensitive data and operations at risk. Researchers have noted that the campaign employs deceptive strategies to trick users into executing malicious code. As a result, affected companies could face significant disruptions and potential data breaches, making it crucial for hospitality organizations to remain vigilant and enhance their cybersecurity measures. The ongoing threat emphasizes the need for robust employee training and awareness to combat social engineering tactics effectively.
Cybersecurity Blog | SentinelOne
SentinelLABS' research for 2025 reveals significant trends in cybersecurity, particularly the adaptation of ransomware for espionage activities and the growing exploitation of cloud platforms. This shift indicates that attackers are increasingly targeting sensitive information stored in cloud environments, which could put numerous enterprises at risk. Companies using cloud services need to be vigilant and enhance their security measures to protect against these evolving threats. The report suggests that the landscape of cybercrime is becoming more sophisticated, making it essential for organizations to stay informed and prepared. Understanding these trends can help enterprises better defend their systems and data against potential breaches.
Infosecurity Magazine
A serious security vulnerability has been discovered in Open WebUI Direct Connections, which could allow attackers to take over user accounts and compromise servers. This flaw poses a significant risk to organizations using the platform, as it could lead to unauthorized access and data breaches. Users of Open WebUI should be especially cautious, as the vulnerability may be actively exploited. It’s crucial for those affected to stay informed about updates and patches from the developers. Companies relying on this software need to prioritize security measures to protect their systems and data from potential attacks.
Researchers have successfully set up a honeypot to attract members of the Lapsus$ hacking group, which has been known for its high-profile cyberattacks. By creating fake accounts and using synthetic data, they were able to gather valuable information about the hackers' infrastructure and tactics. This operation sheds light on the methods used by Lapsus$ and provides insights that could help in defending against their future attacks. The findings may be useful for cybersecurity professionals looking to enhance their defenses against similar threats. Overall, this initiative illustrates the ongoing cat-and-mouse game between hackers and security researchers.
Cybersecurity Blog | SentinelOne
AI coding assistants, like the one integrated with Claude Code, are starting to manage software dependencies through plugins, which has raised new concerns about supply-chain security. When these automation tools are compromised, attackers could manipulate the dependencies that developers rely on, potentially injecting malicious code into software projects. This situation poses a significant risk for developers and companies that use these AI tools, as they might unknowingly include vulnerable or harmful libraries in their applications. The implications extend beyond individual developers to the broader software ecosystem, making it crucial for teams to stay vigilant and assess the security of their dependencies regularly. As reliance on AI tools grows, so does the need for heightened awareness of these emerging risks.
Resecurity has published extensive documentation related to John Erin Binns, a hacker with ongoing activities who remains at large. The release includes over 1,000 messages that reveal Binns' communications with a woman in Turkey and an associate known as 'S.M.' This information could provide valuable insights into his operations and potential targets. The fact that Binns is not currently in U.S. custody raises concerns about the effectiveness of law enforcement efforts to track and capture cybercriminals. Resecurity’s actions may help inform other cybersecurity professionals and law enforcement about the methods and connections used by hackers, potentially leading to better prevention strategies against similar threats.
SecurityWeek
A serious vulnerability in Dolby's software for Android devices has been identified, tracked as CVE-2025-54957. Discovered by Google researchers in October 2025, this flaw could potentially allow attackers to exploit the Dolby audio processing capabilities on affected devices. Users of Android devices utilizing Dolby technology should be particularly cautious, as the vulnerability poses risks to their audio functionality and overall device security. Immediate action is recommended to ensure that devices are updated to the latest software versions that include the necessary patches to fix this issue. This discovery emphasizes the need for regular updates and vigilance among users and security teams alike.
Infosecurity Magazine
The UK government has launched a new Cyber Action plan aimed at strengthening the nation's defenses against cyber threats. This initiative is designed to offer more direct support for organizations in protecting themselves from cyber incidents and improving their response strategies. The plan emphasizes collaboration between public and private sectors, ensuring that resources and expertise are shared effectively. This move responds to the increasing frequency and sophistication of cyberattacks, which pose risks to both national security and the economy. By enhancing the country's cyber resilience, the government aims to better protect businesses and individuals from potential breaches and disruptions.
A single threat actor, identified as an initial access broker (IAB), has been linked to numerous significant data breaches across various organizations. This actor uses stolen credentials obtained through information stealers to gain unauthorized access to systems. Many companies are at risk as these breaches can lead to extensive data exposure and financial loss. Security researchers are urging organizations to bolster their defenses against credential theft, as the actor's methods highlight vulnerabilities that can be exploited. The widespread nature of these breaches emphasizes the need for improved security protocols and user awareness to protect sensitive information.
Cybersecurity researchers at Securonix have reported a new campaign targeting the European hospitality sector, known as PHALT#BLYX. This campaign uses fake booking emails to trick hotel staff into clicking on links that lead to counterfeit blue screen of death (BSoD) error pages. By doing so, attackers aim to install a remote access trojan called DCRat on the victims' systems. This type of malware allows hackers to gain unauthorized access to sensitive information and control over the infected devices. The incident underscores the need for heightened vigilance among hotel employees regarding suspicious emails and links, as these tactics can lead to severe security breaches.
BleepingComputer
Microsoft has responded to concerns raised by a security engineer regarding potential prompt injection vulnerabilities in its Copilot AI assistant. The engineer pointed out issues related to how the AI processes inputs, which could allow malicious prompts to bypass security measures. However, Microsoft disagrees, stating that these issues do not qualify as vulnerabilities. This disagreement reflects a broader debate between tech companies and security researchers about what constitutes a risk in generative AI systems. As AI technology becomes more integrated into various applications, understanding these distinctions is crucial for both developers and users, as it impacts how security measures are implemented and perceived.
A serious vulnerability has been found in n8n, an open-source workflow automation platform, which could allow authenticated users to run arbitrary system commands on the server. This vulnerability, identified as CVE-2025-68668, has a high severity score of 9.9 according to the CVSS system, indicating a significant risk. It stems from a failure in the protection mechanisms that should keep the system secure. Users of n8n should be particularly concerned as this issue could lead to unauthorized control over their systems. The affected versions include all versions prior to the patch that addresses this vulnerability, making it crucial for users to update their installations promptly to prevent potential exploitation.
Help Net Security
Email continues to be the main entry point for cyber attackers, with significant increases in various types of email threats. Malware delivered through email surged by over 130% year-over-year, while phishing scams rose by more than 20% and other scams increased by 30%. These alarming trends expose vulnerabilities across different industries, indicating that many security teams are still missing critical gaps in their defenses. As attackers increasingly exploit email for impersonation and account takeover, companies must reassess their email security strategies to better protect sensitive information and prevent breaches. The growing reliance on email as a communication tool makes it essential for organizations to prioritize security measures in this area.