Skip to main content
Logo-300x300-colored-3
  • Home
  • Services
    • Offensive Security
    • Defensive Security
    • Privacy Engineering
    • AI Advisory
    • AI Assessment
    • AI Integration
  • Products
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Get a Free Assessment
Back to Blog
Cybersecurity Supply Chain GitHub Breach Developer Security

The Extension Blind Spot: How One VS Code Plugin Gave Attackers GitHub's Source Code

Jacob Krell May 20, 2026 13 min read
Table of Contents

    GitHub's 3,800 Repositories Stolen Through a Single IDE Extension

    On May 19, 2026, a single VS Code extension on a single employee's device gave attackers access to 3,800 of GitHub's internal repositories. GitHub confirmed the breach the following morning, disclosed that it had rotated critical credentials and cryptographic keys overnight, and identified the financially motivated hacking group TeamPCP as responsible. The stolen source code appeared on cybercrime forums within hours, with TeamPCP demanding between $50,000 and $95,000 depending on the listing.

    This is the platform that hosts the world's software supply chain. The platform that publishes guidance on secure software delivery, maintains the GitHub Actions ecosystem, and stores the source code for millions of organizations. It was compromised through an IDE extension.

    The GitHub breach did not happen in isolation. It is the fifth successful supply chain compromise attributed to TeamPCP (tracked by Google Threat Intelligence as UNC6780) since March 2026. The pattern across all five is consistent. Target developer tooling that handles credentials. Harvest everything reachable. Use those credentials to spread.

    Target  Date Vector Blast Radius
    Aqua Security Trivy March 2026 Compromised GitHub Actions tags (CVE-2026-33634) 10,000+ CI/CD workflows
    Checkmarx KICS March 2026 Malicious VS Code plugins on OpenVSX 36,000+ extension downloads
    LiteLLM (PyPI) March 2026 Compromised maintainer credentials 95M monthly downloads, ~500K machines
    TanStack + Mistral AI May 2026 Legitimate release pipeline abused, valid SLSA provenance 84+ npm packages
    GitHub May 19, 2026 Poisoned VS Code extension on employee device 3,800 internal repositories

    TeamPCP has also partnered with the Lapsus$ extortion group for monetization, and the collaboration explains the shift from credential harvesting to direct data sales. The convergence between supply chain attackers and high profile extortion groups is creating a compounding effect across the cloud native ecosystem. The campaign is not slowing down. TeamPCP has publicly stated it will continue, claiming upcoming operations aimed at stealing terabytes of trade secrets with its partners.

    The Extension Blind Spot

    The deeper story here is not that GitHub got breached. Breaches happen to the best resourced organizations on the planet. The deeper story is what this breach reveals about the state of supply chain risk in 2026. The attack surface has expanded into layers that most organizations have not yet governed, and threat actors have noticed before defenders have.

    The day before GitHub disclosed its breach, a separate and apparently unrelated incident hit the Nx Console VS Code extension. Nx Console has 2.2 million installations. According to StepSecurity, the compromised version deployed a multi stage credential stealer capable of harvesting tokens from GitHub, npm, AWS, HashiCorp Vault, Kubernetes, and 1Password. It exfiltrated data through three independent channels.

    The malicious version was live for approximately 11 minutes before being pulled. Eleven minutes sounds fast until you consider how many machines auto update extensions in that window.

    Two VS Code extension compromises in two days. One hit 2.2 million potential victims. The other hit GitHub itself. Both exploited the same structural reality. VS Code extensions have full, unrestricted access to everything on the developer's machine.

    This is the extension blind spot. Most organizations today have extensive governance over their production environments. Servers run EDR agents. Cloud workloads operate under IAM policies scoped to least privilege. SaaS applications require SSO and MFA. Even developer laptops have endpoint protection deployed. But the code running inside the IDE sits entirely outside that governance. There is no permission model. No approval workflow. No inventory of installed extensions. No monitoring of what those extensions access.

    The same organization that requires three approvals for a new SaaS subscription allows any developer to install arbitrary code execution environments in their IDE with no oversight whatsoever.

    This started as a gap. The threat landscape moved faster than governance could adapt, and extension security was simply not on the radar. That explanation held in 2024. It does not hold in May 2026. TeamPCP has now compromised five organizations through developer tooling in three months. The Shai Hulud worm family has been tracked since September 2025. The IDEsaster vulnerability class demonstrated in March 2026 that every major AI IDE was vulnerable to extension layer exploitation. The evidence is overwhelming and public. At this point, the absence of extension governance is a choice.

    The extension blind spot is a symptom of a broader condition. Supply chain risk has expanded into the developer tooling layer, the build pipeline, the package registry, and the IDE itself. Organizations that have not extended their supply chain risk management programs to cover these surfaces are exposed in ways that traditional vendor risk assessments will never catch.

    Why This Keeps Working

    The Marketplace Nobody Governs

    The VS Code marketplace hosts approximately 60,000 extensions from around 45,000 different publishers. According to research from Koi Security, only 1,800 of those extensions are verified. The marketplace has accumulated 3.3 billion combined installs. The average developer has approximately 40 extensions installed in their IDE.

    vscode_marketplace_scale

    The scale matters because it defines the attack surface. An attacker who compromises a single popular extension can reach millions of developers in a single move. The verification rate (roughly 3% of all extensions) means 97% of what developers install has no formal vetting beyond the marketplace's automated checks.

    Academic Research Confirms the Structural Weakness

    Peer reviewed research has consistently documented the problem. A 2024 study published at NDSS analyzed 25,402 VS Code extensions and discovered 21 extensions with verified code injection exploits impacting over 6 million installations. A separate analysis of 52,880 extensions found 5.6% exhibited suspicious behavior. A third study examining 27,261 extensions found 8.5% (2,325 extensions) exposed to credential related data leakage through commands, user input, and configurations.

    extension_security_research

    The contrast with browser extensions makes this gap concrete. When you install a Chrome extension, you see a permission prompt. "This extension can read and change all your data on all websites." Chrome uses a declarative permission system where extensions must declare what they need upfront, and users explicitly grant access. Manifest V3 further restricted extensions from executing remote code entirely.

    VS Code has none of this. No permission prompt. No declarative capability system. No restriction on remote code execution. An extension claiming to format JSON has identical technical capabilities to one managing cloud infrastructure. The workspace trust model is binary, and most developers grant full trust to avoid disruption.

    The browser industry solved this problem a decade ago. The IDE industry has not even started.

    VS Code extensions run in a dedicated Node.js Extension Host process with unrestricted access to the file system, network, and can spawn child processes with the same privileges as the VS Code application itself. In practical terms, installing a VS Code extension is equivalent to running an arbitrary Node.js application with the developer's full user permissions.

    This extends beyond VS Code. Cursor, Windsurf, Kiro, and other AI powered IDEs are built on the same VS Code foundation. They inherit the same extension trust model. The AI development boom has multiplied the number of developer tools with this exact vulnerability class. According to Lyrie Research, 73 sleeper malicious extensions have already been deployed across Open VSX, and two unpatched Cursor sandbox escapes enable code execution from extensions in 2026.

    The Supply Chain Attack Trend Is Accelerating

    The broader industry data supports what TeamPCP's campaign makes viscerally obvious. Third party involvement in breaches has gone from 9% in 2022 to 48% in 2025 according to Verizon's DBIR series. That is a fivefold increase in three years. Vulnerability exploitation has followed the same trajectory, rising from 5% of breaches in 2022 to 34% in 2025, overtaking credential theft as the leading breach vector. The median time for full patching increased to 43 days.

    supply_chain_trend

    Developer tooling attacks are the natural evolution of this trend. SolarWinds (2020) compromised a build pipeline to distribute backdoored updates to 18,000 organizations. Codecov (2021) modified a bash uploader script to exfiltrate credentials for two months undetected, affecting GoDaddy, IBM, HPE, and Atlassian. Supply chain attacks jumped over 300% in 2021 alone according to Sonatype's State of the Software Supply Chain report.

    The difference in 2026 is the attack surface has shifted further upstream. The targets are no longer just build systems and package registries. They are the developer's IDE itself, the tool used to write the code before it ever reaches a pipeline. TeamPCP understood this before the industry did.

    EDR Cannot See It

    EDR tools operate at the process and file system level. They detect known malware signatures, suspicious process trees, and anomalous network behavior. But a VS Code extension making authenticated API calls to GitHub using the developer's own credentials looks identical to normal IDE behavior. The malicious activity is indistinguishable from legitimate operation because it is using the same interfaces, the same credentials, and the same access patterns as a legitimate extension.

    Most security teams still have zero visibility into what extensions are installed on their developers' machines. That is the blind spot these attacks keep walking through.

    What Defenders Should Do

    The organizations that will avoid becoming the next entry on TeamPCP's list are the ones that extend their existing security governance to cover the developer tooling layer. The gap exists because this layer grew outside traditional security boundaries. Closing it requires deliberate action.

    Implement extension allow listing. VS Code's `AllowedExtensions` policy (available since v1.96) lets organizations control exactly which extensions can install. Deploy it via Microsoft Intune, Active Directory Group Policy, or any MDM solution. The configuration is granular: allow by publisher (`"microsoft": true`), by specific extension (`"esbenp.prettier-vscode": true`), or pin to specific versions (`"dbaeumer.vscode-eslint": ["3.0.0"]`). When enforced, unapproved extensions cannot install and become disabled if already present. This is the single highest impact control available today.

    Build an extension inventory. Security teams cannot govern what they cannot see. Organizations need visibility into what extensions are installed across their developer fleet, when they were last updated, and who published them. Treat this inventory with the same rigor applied to software asset management for production systems.

    Isolate credentials from the developer desktop. The fundamental problem is that developer workstations hold persistent credentials to sensitive systems. Short lived credentials, hardware bound tokens, and just in time access models reduce the blast radius when a workstation is compromised. A stolen OAuth token that expires in fifteen minutes is worth significantly less than a long lived personal access token with repository admin scope.

    Segment developer access by project scope. A developer working on a frontend feature should not have credentials to infrastructure repositories loaded in the same IDE session. Scoped access models limit what any single compromised extension can reach.

    Treat developer workstations as part of the attack surface. The same assume breach posture organizations apply to servers and cloud workloads needs to extend to developer machines. Monitor for anomalous extension behavior. Alert on unusual outbound connections from IDE processes. Include developer workstations in threat hunting hypotheses.

    Apply zero trust to the tooling layer. We have written previously that zero trust should extend to the dependency graph. The same principle applies to the IDE itself. Every extension, every plugin, every integration running inside a developer's IDE is executing with implicit trust that is rarely evaluated. That trust should be earned, monitored, and revocable.

    Supply Chain Risk Is No Longer Optional to Manage

    The GitHub breach is a data point on a trend line that has gone from 9% third party involvement in breaches in 2022 to 48% in 2025. TeamPCP alone has hit five organizations in three months. The question for security leaders is no longer whether supply chain risk is material. It is whether their organization has done anything structured to measure and manage it.

    Most organizations run vendor risk assessments for their SaaS providers and cloud vendors. Far fewer extend that same rigor to the software supply chain, the development tooling, or the extensions running on every developer workstation. The governance gap is not theoretical anymore. It is the active attack surface that the most effective threat actors of 2026 exploit repeatedly and successfully.

    The extension blind spot is the most visible symptom. The underlying condition is supply chain risk that has outgrown the governance structures most organizations built to manage it.

    At a Glance

    What happened. On May 19, 2026, TeamPCP compromised a GitHub employee's device through a poisoned VS Code extension and exfiltrated 3,800 internal repositories. This is their fifth successful supply chain attack in three months.

    Why it matters. VS Code extensions have full, unrestricted access to everything on a developer's machine. No sandbox, no permission model, no approval workflow. 97% of the 60,000 extensions in the marketplace are unverified. The browser industry solved this a decade ago. The IDE industry has not started.

    The trend. Third party involvement in breaches went from 9% to 48% in three years according to Verizon's DBIR series. Supply chain attacks are shifting upstream from build systems and package registries into the IDE itself, the tool used to write code before it ever reaches a pipeline.

    What to do. Deploy VS Code's `AllowedExtensions` policy via Intune or GPO. Build an extension inventory. Isolate credentials with short lived tokens. Include developer workstations in threat hunting. Extend third party risk assessments to cover developer tooling and open source dependencies.

    Who is affected. Any organization using VS Code, Cursor, Windsurf, or other VS Code based IDEs. The extension trust model is inherited across all of them.

     

    Sources:

     

    - SecurityWeek, "GitHub Confirms Hack Impacting 3,800 Internal Repositories," May 20, 2026

    - HackRead, "GitHub Breach: TeamPCP Steals 3,800 Repositories via VS Code Extension," May 20, 2026

    - SecurityWeek, "From Trivy to Broad OSS Compromise: TeamPCP Hits Docker Hub, VS Code, PyPI," May 2026

    - StepSecurity, "Nx Console VS Code Extension Compromised," May 2026

    - The Record, "GitHub confirms being hacked by TeamPCP, says customer data unaffected," May 20, 2026

    - Aikido Security, research on VS Code extension attack surface, May 2026

    - Verizon, "Data Breach Investigations Report," 2023, 2024, 2025, 2026 editions

    - Koi Security, "Exposing Malicious Extensions: Shocking Statistics from the VS Code Marketplace," 2026

    - NDSS 2024, "Developers Are Victims Too: A Comprehensive Analysis of The VS Code Extension Ecosystem"

    - Lyrie Research, "The Compromised Workbench: Definitive 2026 Defensive Playbook Against IDE Extension Supply Chain Attacks," 2026

    - Sonatype, "State of the Software Supply Chain Report," 2021

     

    Share
    Tags: Cybersecurity Supply Chain GitHub Breach Developer Security
    Jacob Krell
    Jacob Krell

    Jacob Krell builds systems that are hard to break and breaks systems that appear resilient. He is an offensive security leader specializing in advanced penetration testing and red teaming across cloud, web, mobile, Active Directory, and AI-enabled environments, helping organizations expose real-world risk and validate their defenses against modern adversaries. In parallel, he is a full-stack software engineer who develops custom cybersecurity tooling, intelligent automation platforms, and production-grade applications that embed security directly into the technology lifecycle. Ranked 25th globally on Hack The Box with more than 1,000 flags captured and holding many elite certifications, including OSCE3, CISSP, OSCP, CCNP Security, and CSIE, Jacob combines hands-on technical depth with the ability to translate complex cyber risk into clear business strategy.

    Suzu Labs provides vCISO services with integrated supply chain risk management.

    If your organization needs structured guidance on third party risk assessments, developer tooling governance, or supply chain security posture, we can help.

    Get In Touch
    ← Previous The Cost of a Click: Why Passive Cookie Consent Is Your Biggest Compliance Liability

    Latest Posts

    View All
    The Extension Blind Spot: How One VS Code Plugin Gave Attackers GitHub's Source Code
    Cybersecurity
    May 20, 2026 Jacob Krell

    The Extension Blind Spot: How One VS Code Plugin Gave Attackers GitHub's Source Code

    GitHub's 3,800 Repositories Stolen Through a Single IDE Extension On May 19, 2026, a single VS Code extension on a ...

    Read More: The Extension Blind Spot: How One VS Code Plugin Gave Attackers GitHub's Source Code
    The Cost of a Click: Why Passive Cookie Consent Is Your Biggest Compliance Liability
    May 20, 2026 Hannah Perez

    The Cost of a Click: Why Passive Cookie Consent Is Your Biggest Compliance Liability

    If you think a basic pop-up banner that reads "By continuing to browse this site, you accept cookies" protects your ...

    Read More: The Cost of a Click: Why Passive Cookie Consent Is Your Biggest Compliance Liability
    Five Years of US Privacy Breach Data Tell a Story Security Leaders Cannot Ignore
    Data Privacy
    May 19, 2026 Jacob Krell

    Five Years of US Privacy Breach Data Tell a Story Security Leaders Cannot Ignore

    In April 2026 alone, the ShinyHunters extortion group breached ADT (5.5 million customers), Amtrak (2.1 million ...

    Read More: Five Years of US Privacy Breach Data Tell a Story Security Leaders Cannot Ignore
    Mean Time to Exploit Has Gone Negative. Security Strategy Has to Change.
    Vulnerability Management
    May 05, 2026 Jacob Krell

    Mean Time to Exploit Has Gone Negative. Security Strategy Has to Change.

    Mandiant's M-Trends 2026 report puts estimated mean time to exploit at negative seven days. That number should reset ...

    Read More: Mean Time to Exploit Has Gone Negative. Security Strategy Has to Change.
    When AI Billing Breaks Trust: What the Claude Code Backlash Says About AI Governance
    Prompt Injection
    Apr 30, 2026 Hannah Perez

    When AI Billing Breaks Trust: What the Claude Code Backlash Says About AI Governance

    When AI Billing Breaks Trust: Lessons from the Claude Code Backlash AI adoption is accelerating, but trust is still ...

    Read More: When AI Billing Breaks Trust: What the Claude Code Backlash Says About AI Governance
    From Army Ranger to Ethical Hacker: What Cybersecurity Can Learn from the Battlefield
    Cybersecurity
    Apr 29, 2026 Suzu Labs

    From Army Ranger to Ethical Hacker: What Cybersecurity Can Learn from the Battlefield

    Cybersecurity doesn’t start with tools, it starts with mindset. In this episode featuring Aaron Colclough, we get a ...

    Read More: From Army Ranger to Ethical Hacker: What Cybersecurity Can Learn from the Battlefield
    When Elite Cyber Teams Can't Crack Web Security
    Cybersecurity
    Apr 23, 2026 Jacob Krell

    When Elite Cyber Teams Can't Crack Web Security

    HTB's 2025 benchmark tested 796 security teams. Only 21% passed web security challenges. The Security Illusion Security ...

    Read More: When Elite Cyber Teams Can't Crack Web Security
    The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them
    Cybersecurity
    Apr 22, 2026 Jacob Krell

    The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them

    In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. ...

    Read More: The Invisible Threat: Business Logic Flaws in Modern Applications and Why Scanners Miss Them
    Suzu Labs Acquires Emulated Criminals
    Apr 20, 2026 Hannah Perez

    Suzu Labs Acquires Emulated Criminals

    Bridging the gap between theory and the threat reality, Suzu Labs is proud to announce the acquisition of Emulated ...

    Read More: Suzu Labs Acquires Emulated Criminals
    The Wall Around Claude 4.7 Does Not Extend to Dread
    Cybersecurity
    Apr 17, 2026 Suzu Labs

    The Wall Around Claude 4.7 Does Not Extend to Dread

    Anthropic released Claude Opus 4.7 on April 16, 2026 with automated cybersecurity safeguards and a Cyber Verification ...

    Read More: The Wall Around Claude 4.7 Does Not Extend to Dread
    The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control
    youtube
    Apr 10, 2026 Jacob Krell

    The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control

    Earlier this year, YouTube began rolling out a row of algorithmically recommended videos at the top of the ...

    Read More: The Engagement Ratchet: How YouTube, Instagram, and Amazon Trained Users to Accept Less Control
    The AI Revolution: How Jobs Will Change by 2030
    Cybersecurity
    Apr 07, 2026 Suzu Labs

    The AI Revolution: How Jobs Will Change by 2030

    Host Phillip Wylie sits down with Nicolas Chaillan to discuss the sobering reality of AI replacement, the critical need ...

    Read More: The AI Revolution: How Jobs Will Change by 2030
    The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
    Generative AI
    Apr 01, 2026 Hannah Perez

    The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?

    In late 2024, Sydney tech entrepreneur Paul Conyngham was told his rescue dog, Rosie, had months to live. She was ...

    Read More: The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
    From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone
    Cybersecurity
    Mar 30, 2026 Suzu Labs

    From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone

    The world of cybersecurity has undergone a massive transformation in just a few decades. In this episode of Simply ...

    Read More: From Analog Hacks to Agentic AI: The Evolution of Offensive Security with Denis Calderone
    While TSA Made Headlines, CISA Went Dark
    Critical Infrastructure
    Mar 30, 2026 Jacob Krell

    While TSA Made Headlines, CISA Went Dark

    The Department of Homeland Security has been partially shut down for over 45 days. In that time, 460 TSA officers have ...

    Read More: While TSA Made Headlines, CISA Went Dark
    The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks
    AI Security
    Mar 30, 2026 Suzu Labs

    The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks

    In cybersecurity, we often operate in silos. The red team breaks things, the blue team fixes them, and management ...

    Read More: The Purple Team Advantage: Bridging the Gap Between Hacking and Management with Chris Marks
    Claude Mythos and the Cybersecurity Risk That Was Already Here
    Threat Intelligence
    Mar 27, 2026 Jacob Krell

    Claude Mythos and the Cybersecurity Risk That Was Already Here

    On March 26, Anthropic confirmed the existence of Claude Mythos, an unreleased AI model described internally as "a step ...

    Read More: Claude Mythos and the Cybersecurity Risk That Was Already Here
    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Critical Infrastructure
    Mar 26, 2026 Mike Bell

    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It

    Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what ...

    Read More: BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    Cybersecurity
    Mar 23, 2026 Hannah Perez

    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026

    We are incredibly proud to announce a monumental achievement. At this year’s Global InfoSec Awards 2026, hosted by ...

    Read More: Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity
    Cybersecurity
    Mar 17, 2026 Suzu Labs

    From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity

    In the world of cybersecurity, we often talk about "gatekeeping" or the "skills gap," but rarely do we find individuals ...

    Read More: From Cockpits to Code: Josh Mason on Bridging the Gap Between Military and Cybersecurity
    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    Cybersecurity
    Mar 16, 2026 Phillip Wylie

    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

    The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...

    Read More: Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Critical Infrastructure
    Mar 13, 2026 Denis Calderone

    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

    On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...

    Read More: From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    Social Engineering
    Mar 09, 2026 Suzu Labs Intelligence

    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

    Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...

    Read More: Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More: The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More: The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Cybersecurity
    Mar 03, 2026 Phillip Wylie

    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

    In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...

    Read More: Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More: Anthropic and Claude: 2026 AI Powerhouse
    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Cybersecurity
    Feb 24, 2026 Phillip Wylie

    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

    In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...

    Read More: Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Cybersecurity
    Feb 17, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

    In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...

    Read More: Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More: Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Threat Intelligence
    Feb 10, 2026 Phillip Wylie

    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...

    Read More: Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More: Under Armour Breach: What The Forum Data Actually Shows
    SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers
    Briefing Room
    Jan 29, 2026 Dahvid Schloss

    SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers

    This article is in reference to our newest POC hosted on GitHub here: https://github.com/Emulated-Criminals/SilentFrame ...

    Read More: SilentFrame: A Research POC on Post-Exploitation Credential Collection through Browsers
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More: Brightspeed Breach: Crimson Collective and the Infostealer Problem
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More: When Grid Data Goes Dark Web
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More: The $150,000 Password
    Seeing Everything, Understanding Nothing
    Briefing Room
    Jan 16, 2026 Dahvid Schloss

    Seeing Everything, Understanding Nothing

    To help you get a head start on making your environment safer and in keeping with the theme of January’s “New Year, New ...

    Read More: Seeing Everything, Understanding Nothing
    New Year, New Priorities - So, what to fix first?
    Briefing Room
    Jan 08, 2026 Dahvid Schloss

    New Year, New Priorities - So, what to fix first?

    The most common phrase we hear from our prospects is, “We are overwhelmed, and we aren’t sure what to tackle first.” ...

    Read More: New Year, New Priorities - So, what to fix first?
    UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)
    Briefing Room
    Nov 21, 2025 Dahvid Schloss

    UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)

    Repository purpose: this research was to evaluate the feasiabilty of using Alternate Data Stream (ADS) in staging and ...

    Read More: UnderByte — A Ransomware experiment using Alternate Data Streams (ADS)
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact
    • FAQ's

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Offensive Security
    • Defensive Security
    • Adversarial Operations
    • Social Engineering

    Resources

    • Blog
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions