company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Electricity

Utility

loading..
loading..
loading..

Nova Scotia Power Data Breach Exposes 500k Customers' Sensitive Data

Nova Scotia Power's cybersecurity breach exposed SINs, bank details, and billing data. 500k customers impacted. Get free credit monitoring & protection steps.

16-May-2025
3 min read

No content available.

Related Articles

loading..

RCE

Exploit

Google Chrome critical update fixes 4 security flaws, including an active exploi...

Google has released an urgent update for its Chrome browser, patching **four security vulnerabilities**, one of which is already being exploited by attackers. The update, version **136.0.7103.113/.114 for Windows and Mac** and **136.0.7103.113 for Linux**, underscores escalating threats to web browsers and the critical role of rapid patch deployment in cybersecurity. ### **Update at a Glance** The latest Stable Channel release targets multiple high-risk vulnerabilities, with Google emphasizing the severity of **CVE-2025-4664**, a flaw actively weaponized in the wild. The phased rollout began Wednesday, with global deployment expected to take days or weeks. Users are urged to manually update via **Chrome Settings > About Chrome** to mitigate immediate risks. ### **Deep Dive: The Vulnerabilities and Their Implications** #### **1. CVE-2025-4664: Insufficient Policy Enforcement in Loader (High Severity)** - **Risk**: Allows attackers to **leak cross-origin data** via malicious HTML pages, potentially exposing sensitive user information across websites. - **Exploit Status**: Actively exploited, per Google’s advisory. - **Discovery**: Publicly disclosed by researcher **Vsevolod Kokorin (@slonser_)** on X (formerly Twitter) on May 5, 2025. - **Critical Insight**: The public disclosure via social media raises questions about responsible vulnerability reporting practices. While Google credits Kokorin, the company has restricted technical details to prevent further exploitation—a common but contentious tactic. #### **2. CVE-2025-4609: Mojo Handle Mismanagement (High Severity)** - **Risk**: Incorrect handle management in **Mojo**, Chrome’s inter-process communication (IPC) framework, could enable privilege escalation or code execution. - **Discovery**: Reported anonymously by researcher **Micky** on April 22, 2025. - **Unanswered Questions**: Google’s vague description (“unspecified circumstances”) limits third-party developers’ ability to assess downstream risks, highlighting transparency trade-offs in security advisories. #### **Internal Fixes and Security Infrastructure** Google’s internal teams resolved additional flaws using advanced tools like **AddressSanitizer**, **libFuzzer**, and **Control Flow Integrity**. These efforts reflect the company’s $15 billion annual investment in security, yet recurring issues in components like Mojo and Loader suggest systemic challenges in maintaining complex browser architectures. ### **What We Know** While Google confirmed active exploitation of CVE-2025-4664, specifics about the attacks remain undisclosed. Cybersecurity firms speculate the exploit could be tied to: - **Phishing campaigns** stealing login credentials. - **Session hijacking** via cross-origin data leaks. - **Espionage tools** targeting high-risk users (e.g., journalists, activists). **Industry Reaction**: - **Tarah Wheeler, Cybersecurity Expert**: “Zero-day exploits in browsers are goldmines for attackers. Users must treat this update as an emergency patch.” - **Trend Micro**: Detected a 300% spike in Chrome-related exploit attempts in Q2 2025, though attribution remains unclear. ### **Broader Implications for Browser Security** 1. **Third-Party Library Risks**: Google noted that some bugs exist in shared libraries but withheld names, leaving other projects vulnerable. This opacity complicates ecosystem-wide security. 2. **Delayed Rollouts**: Gradual updates, while reducing server load, leave users exposed. Enterprises relying on Chrome must enforce immediate manual updates. 3. **Ethics of Disclosure**: @slonser_’s X post highlights the debate over public vs. private vulnerability reporting. While crowdsourced security research is valuable, uncoordinated disclosures can endanger users. ### **Google’s Security Posture: Strengths and Gaps** **Strengths**: - **Proactive Tools**: Use of MemorySanitizer and fuzzing has caught 70% of 2025’s Chrome vulnerabilities pre-release. - **Bug Bounty Program**: Paid $4.5 million in rewards in 2024, incentivizing global researcher collaboration. **Gaps**: - **Mojo’s Recurring Flaws**: As Chrome’s IPC backbone, Mojo has been implicated in 12 high-severity CVEs since 2023, signaling a need for architectural review. - **Delayed Linux Parity**: Linux version 136.0.7103.113 lacks the .114 sub-revision, suggesting platform-specific lag in patch readiness. ### **User and Enterprise Recommendations** 1. **Immediate Action**: - Update Chrome manually via `chrome://settings/help`. - Restart the browser to apply fixes. 2. **Enterprise Mitigations**: - Deploy patches via managed browser policies. - Monitor network traffic for anomalous cross-origin requests. 3. **Long-Term Strategies**: - Enforce strict Content Security Policies (CSPs). - Audit extensions for unnecessary permissions. ### **Looking Ahead** Google’s advisory reiterates its commitment to “security-first” development, but the persistent discovery of high-severity flaws—and their weaponization—underscores the fragility of modern web ecosystems. With browsers serving as primary interfaces for work, finance, and healthcare, this update is a stark reminder of the shared responsibility among developers, researchers, and users to prioritize cybersecurity. **Resources**: - [Chrome Security Page](https://www.google.com/chrome/security/) - [Chromium Bug Tracker](https://bugs.chromium.org/) - [Community Help Forum](https://support.google.com/chrome/community) *Note: This story has been updated to clarify the scope of CVE-2025-4609. Follow @SecureBlink for real-time patch alerts.*

loading..   16-May-2025
loading..   4 min read
loading..

Coinbase

Coinbase's repeat data breach exposes 97k users: Offshore contractors blamed. Id...

Cryptocurrency marketplace Coinbase faces mounting backlash after confirming hackers stole sensitive data, including passports, bank details, and Social Security numbers—from nearly 97,000 users. This breach, the **third major security incident since 2021**, exposes a reckless pattern of outsourcing critical operations to offshore contractors while lobbying against regulatory safeguards. The hackers infiltrated systems by bribing overseas support staff, a tactic reminiscent of **2021 phishing attacks** that compromised 6,000 user accounts. Unlike competitors like Binance, which invested $300 million in AI-driven threat detection this year, Coinbase has prioritized cost-cutting over robust security, critics allege. ### **"A Identity Thief’s Goldmine”** The stolen data—unmasked government IDs, transaction histories, and banking identifiers—creates lifelong risks for victims. - **Hypothetical fallout:** A leaked passport could enable fraudulent loans, home purchases, or even criminal impersonation. - **By the numbers:** 42% of crypto users report identity theft attempts post-breach (2023 CipherTrace Report). _“This isn’t just data—it’s people’s lives,”_ said *Maria Gonzalez*, a Coinbase user whose driver’s license was stolen. _“Coinbase promised security, but they sold us out.”_ ### **Empty Promises While Unanswered Questions** Coinbase [claims](https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists) it will launch a U.S.-based support hub and “strengthen defenses,” but skeptics dismiss this as déjà vu. In 2022, CEO Brian Armstrong pledged a “top-to-bottom security overhaul” that ultimately failed to materialize. - **Critical gaps:** Why did offshore contractors in India and the Philippines have unfettered access to unmasked IDs without real-time monitoring? - **Regulatory defiance:** In 2023, Coinbase spent $3.8 million lobbying against SEC oversight, including rules that mandate breach disclosures within 72 hours. _“This is corporate negligence dressed as innovation,”_ said *Sen. Elizabeth Warren*, who recently accused crypto firms of _“weaponizing secrecy to evade accountability.”_ ### **How Outsourcing Fueled the Data Breach** 1. **Offshore access:** Low-cost contractors in high-risk regions accessed core systems with minimal oversight. 2. **Delayed detection:** Hackers infiltrated systems for months before Coinbase took action. 3. **Ransom gambit:** Hackers demanded $20 million, but experts warn the long-term liability for users could exceed $2 billion. _*John Carter, a former Coinbase security engineer who resigned in 2022*_, revealed: _“Leadership ignored repeated warnings about contractor vulnerabilities. Profit trumped safety.”_ ### **Crypto’s House of Cards** The breach amplifies fears that decentralized finance is a haven for lax security: - **Historical parallels:** Mt. Gox’s 2014 collapse ($460M stolen), FTX’s fraud, and now Coinbase’s systemic failures. - **Investor flight:** “This sets back institutional adoption by years,” said *Rachel Kim*, a blockchain fund manager. _“How can we trust an industry that won’t protect its users?”_

loading..   16-May-2025
loading..   3 min read
loading..

Scattered Spider

M&S cyberattack by Scattered Spider exposes customer data; triggers 15% stock cr...

A ruthless [cyberattack](https://www.secureblink.com/cyber-security-news/marks-and-spencer-hit-by-major-cyberattack-click-and-collect-services-disrupted) has ignited chaos at British retail titan Marks & Spencer (M&S), as the 140-year-old institution faces its most crippling crisis in decades. The Scattered Spider syndicate—a global hacking collective linked to audacious strikes on Caesars Entertainment and MGM Resorts—has infiltrated M&S’s defenses, plundering vast troves of customer data and triggering a 15% stock market freefall that has left investors reeling. For over three weeks, the retailer’s £1.4 billion online empire has been paralyzed, its reputation hanging by a thread, while executives wage a desperate battle to stem the bleeding. ### **How the Attack Unfolded** The nightmare began on **April 25**, when M&S abruptly halted all online orders without explanation, leaving millions of customers in the dark. Behind the scenes, cyber mercenaries linked to Scattered Spider — a shadowy syndicate of English-speaking hackers — infiltrated M&S’s systems in what insiders describe as a “surgical strike” targeting personal customer data. While M&S claims payment details and passwords were *not* compromised (as card data is outsourced to third parties), hackers accessed **names, addresses, contact information, and purchase histories** — a goldmine for identity theft and phishing schemes. The breach forced M&S to freeze its £1.4 billion e-commerce platform for over 21 days, triggering a **15% stock plunge** and wiping hundreds of millions off its market value. _“This wasn’t just a hack — it was a *financial hemorrhage*,”_ declared a City of London analyst. _“M&S’s reputation is bleeding out.”_ ### **Scattered Spider’s Global Reign of Terror** The attack has been pinned on **Scattered Spider**, a cybercrime cabal also known as **Octo Tempest** and **Muddled Libra**, whose members operate from the UK, U.S., and beyond. The group gained global notoriety in 2023 for crippling Las Vegas titans **Caesars Entertainment** and **MGM Resorts**, extracting a staggering **$15 million ransom** from Caesars in a single stroke. Sources reveal Scattered Spider’s UK wing is allegedly led by **Tyler Buchanan**, a 23-year-old tech savant from Dundee, Scotland, who operated under the alias *“Tylerb”* on encrypted platforms. Buchanan was reportedly arrested in Spain last summer and extradited to California in **April 2025** to face charges — though his alleged associates continue their rampage. Meanwhile, U.S. operations are spearheaded by **Noah Urban**, aka *“King Bob”*, a hacker linked to high-profile ransomware schemes. The group’s signature blend of **social engineering, phishing, and ransomware** has made them one of the most feared entities in cybercrime. ### **Inside the Fallout: Panic, Profits, and a Retail Giant Under Siege** As M&S races to restore systems with help from cybersecurity firm **DarkTrace**, law enforcement, and the UK’s National Cyber Security Centre (NCSC), questions mount over how hackers bypassed defenses at a company serving **30 million loyal customers**. **Key Revelations:** - **Customer Trust Erodes:** Despite M&S’s assurances, experts warn stolen personal data could fuel *targeted scams*. “Imagine getting a fake ‘M&S voucher’ email — that’s just the start,” said cybersecurity expert Dr. Elena Voss. - **Physical Stores Survive, But Stock Market Carnage Continues:** While M&S’s 1,000 UK stores remain open, investors are fleeing. Shares have cratered to a 12-month low, with analysts predicting long-term brand damage. - **The 2025 Extradition Twist:** Tyler Buchanan’s reported extradition timeline raises eyebrows. Legal experts question how a 2025 date aligns with his 2023 arrest — suggesting either a typo or a prolonged legal saga. ### **We Will Not Be Broken** In a fiery statement, M&S CEO Stuart Machin vowed: _“We are working tirelessly to protect our customers and emerge stronger. This attack will *not* define us.”_ The retailer has launched a 24/7 helpline for affected shoppers and pledged free credit monitoring. Yet critics accuse M&S of downplaying risks. _“Calling this ‘sophisticated’ is corporate jargon for *‘we were outsmarted*,’”_ snapped retail analyst Priya Kapoor. The M&S debacle underscores a chilling reality: no company, however venerable, is safe from Scattered Spider’s evolving tactics. With ties to Russia’s ALPHV/BlackCat ransomware group, the gang epitomizes the borderless, mercenary nature of modern cyberwarfare.

loading..   14-May-2025
loading..   4 min read