·

What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 2/2/26

Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

Featured Analysis

Featured article analysis: Coinbase confirms insider breach linked to leaked support tool screenshots

This analysis examines the report from BleepingComputer regarding a security breach at Coinbase involving the unauthorized access of customer data via internal support tools.

The article details a security incident where a Coinbase contractor improperly accessed the sensitive information of approximately 30 customers. This breach came to light after a hacking group known as “Scattered LAPSUS$ Hunters” posted screenshots on Telegram that appeared to show an internal support panel. These screenshots revealed high-level account details, including cryptocurrency balances, one showing over $300,000, along with personally identifiable information (PII) such as names, dates of birth, and phone numbers. While Coinbase confirmed the contractor’s involvement and subsequent termination, the incident highlights a persistent vulnerability: the exploitation of human access points within a platform’s support infrastructure.

A significant portion of the analysis focuses on the evolving tactics of cybercriminals who target Business Process Outsourcing (BPO) firms. Rather than attempting to bypass Coinbase’s primary technical defenses, threat actors targeted the support staff who possess legitimate credentials to view customer data. This “insider-as-a-service” model, where contractors are either bribed or compromised to provide screenshots and data, allows attackers to bypass traditional security perimeters. The report underscores that even a single compromised individual can provide enough information for hackers to facilitate targeted social engineering attacks or account takeovers, posing a disproportionate risk relative to the number of users initially affected.

Finally, the article serves as a cautionary tale for the broader cryptocurrency and financial sectors regarding third-party risk management. Although Coinbase took swift action by firing the individual, notifying the affected users, and offering identity theft protection, the breach mirrors a much larger previous incident involving contractors in India. This repetition suggests that technical safeguards like Multi-Factor Authentication (MFA) and encryption are insufficient if the “human firewall” is breached. The analysis concludes that for major exchanges, the greatest security challenge may no longer be the strength of their code, but the difficulty of monitoring and securing the vast network of global support personnel who hold the keys to user accounts.

Projects

Videos

Articles

, , , , , , , , , , , , , , , , , , ,