Coupang recovers smashed laptop that alleged data leaker threw into river

South Korean online retailer Coupang is defending its response to a major data breach by an insider, releasing more details of the investigation — including a MacBook recovered from a river bottom.

The Record from Recorded Future News – ​Read More

You may finally be able to fix your embarrassing Gmail address – here’s how

Official documents indicate a long-awaited change might be coming.

Latest news – ​Read More

Infostealer Malware Delivered in EmEditor Supply Chain Attack

The ‘download’ button on the official EmEditor website served a malicious installer.

The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

22 Million Affected by Aflac Data Breach

Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems.

The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek.

SecurityWeek – ​Read More

The Worst Hacks of 2025

From university breaches to cyberattacks that shut down whole supply chains, these were the worst cybersecurity incidents of the year.

Security Latest – ​Read More

The Most Dangerous People on the Internet in 2025

From Donald Trump to DOGE to Chinese hackers, this year the internet’s chaos caused outsized real-world harm.

Security Latest – ​Read More

The New Surveillance State Is You

Privacy may be dead, but civilians are turning conventional wisdom on its head by surveilling the cops as much as the cops surveil them.

Security Latest – ​Read More

Fresh MongoDB Vulnerability Exploited in Attacks

Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers.

The post Fresh MongoDB Vulnerability Exploited in Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

You’ve been targeted by government spyware. Now what?

Tech companies are increasingly warning their customers that they have been targeted by governments with advanced government spyware, such as NSO’s Pegasus or Paragon’s Graphite. What happens after receiving a threat notification?

Security News | TechCrunch – ​Read More

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction of user data from AI memory.
The result: 23.77 million secrets were leaked through AI

The Hacker News – ​Read More