A major player in the global fashion jewellery market for many years, Pandora has long been positioned as a dominant force in this field as the world's largest jewellery brand. However, the luxury retailer is now one of a growing number of companies that have been targeted by cybercriminals.
A pivotal moment in the regulation of the digital sphere has been marked by the introduction of the United Kingdom's Online Safety Act in July 2025. With the introduction of this act, strict age verification measures have been implemented to ensure that users are over the age of 25 when accessing certain types of online content, specifically adult websites.
Under the law, all UK internet users have to verify their age before using any of these platforms to protect minors from harmful material. As a consequence of the rollout, there has been an increase in circumvention efforts, with many resorting to the use of virtual private networks (VPNs) in an attempt to circumvent these controls.
As a result, a national debate has arisen about how to balance child protection with privacy, as well as the limits of government authority in online spaces, with regard to child protection. A company that falls within the Online Safety Act entails that they must implement stringent safeguards designed to protect children from harmful online material as a result of its provisions.
In addition to this, all pornography websites are legally required to have robust age verification systems in place. In a report from Ofcom, the UK's regulator for telecoms and responsible for enforcing the Child Poverty Act, it was found that almost 8% of children aged between eight and fourteen had accessed or downloaded a pornographic website or application in the previous month.
Furthermore, under this legislation, major search engines and social media platforms are required to take proactive measures to keep minors away from pornographic material, as well as content that promotes suicide, self-harm, or eating disorders, which must not be available on children's feeds at all. Hundreds of companies across a wide range of industries have now been required to comply with these rules on such a large scale.
The United Kingdom’s Online Safety Act came into force on Friday. Immediately following the legislation, a dramatic increase was observed in the use of virtual private networks (VPNs) and other circumvention methods across the country. Since many users have sought alternative means of accessing pornographic, self-harm, suicide, and eating disorder content because of the legislation, which mandates "highly effective" age verification measures for platforms hosting these types of content, the legislation has led some users to seek alternatives to the platforms.
The verification process can require an individual to upload their official identification as well as a selfie in order to be analysed, which raises privacy concerns and leads to people searching for workarounds that work. There is no doubt that the surge in VPN usage was widely predicted, mirroring patterns seen in other nations with similar laws. However, reports indicate that users are experimenting with increasingly creative methods of bypassing the restrictions imposed on them.
There is a strange tactic that is being used in the online community to trick certain age-gated platforms with a selfie of Sam Porter Bridges, the protagonist of Death Stranding, in the photo mode of the video game. In today's increasingly creative circumventions, the ongoing cat-and-mouse relationship between regulatory enforcement and digital anonymity underscores how inventive circumventions can be.
Virtual private networks (VPNs) have become increasingly common in recent years, as they have enabled users to bypass the United Kingdom's age verification requirements by routing their internet traffic through servers that are located outside the country, which has contributed to the surge in circumvention. As a result of this technique, it appears that a user is browsing from a jurisdiction that is not regulated by the Online Safety Act since it masks their IP address.
It is very simple to use, simply by selecting a trustworthy VPN provider, installing the application, and connecting to a server in a country such as the United States or the Netherlands. Once the platform has been active for some time, age-restricted platforms usually cease to display verification prompts, as the system does not consider the user to be located within the UK any longer.
Following the switch of servers, reports from online forums such as Reddit indicate seamless access to previously blocked content. A recent study indicated VPN downloads had soared by up to 1,800 per cent in the UK since the Act came into force. Some analysts are arguing that under-18s are likely to represent a significant portion of the spike, a trend that has caused lawmakers to express concern.
There have been many instances where platforms, such as Pornhub, have attempted to counter circumvention by blocking entire geographical regions, but VPN technology is still available as a means of gaining access for those who are determined to do so. Despite the fact that the Online Safety Act covers a wide range of digital platforms besides adult websites that host user-generated content or facilitate online interaction, it extends far beyond adult websites.
The same stringent age checks have now been implemented by social media platforms like X, Bluesky, and Reddit, as well as dating apps, instant messaging services, video sharing platforms, and cloud-based file sharing services, as well as social network platforms like X, Bluesky, and Reddit. Because the methods to prove age have advanced far beyond simply entering the date of birth, public privacy concerns are intensified.
In the UK’s communications regulator, Ofcom, a number of mechanisms have been approved for verifying the identity of people, including estimating their facial age by uploading images or videos, matching photo IDs, and confirming their identity through bank or credit card records. Some platforms perform these checks themselves, while many rely on third-party providers-entities that will process and store sensitive personal information like passports, biometric information, and financial information.
The Information Commissioner's Office, along with Ofcom, has issued guidance stating that any data collected should only be used for verification purposes, retained for a limited period of time, and never used to advertise or market to individuals. Despite these safeguards being advisory rather than mandatory, they remain in place.
With the vast amount of highly personal data involved in the system and its reliance on external services, there is concern that the system could pose significant risks to user privacy and data security. As well as the privacy concerns, the Online Safety Act imposes a significant burden on digital platforms to comply with it, as they are required to implement “highly effective age assurance” systems by the deadline of July 2025, or face substantial penalties as a result.
A disproportionate amount of these obligations is placed on smaller companies and startups, and international platforms must decide between investing heavily in UK-specific compliance measures or withdrawing all services altogether, thereby reducing availability for British users and fragmenting global markets. As a result of the high level of regulatory pressure, in some cases, platforms have blocked legitimate adult users as a precaution against sanctions, which has led to over-enforcement.
Opposition to this Act has been loud and strong: an online petition calling for its repeal has gathered more than 400,000 signatures, but the government still maintains that there are no plans in place to reverse it. Increasingly, critics assert that political rhetoric is framed in a way that implies tacit support for extremist material, which exacerbates polarisation and stifles nuanced discussion.
While global observers are paying close attention to the UK's internet governance model, which could influence future internet governance in other parts of the world, global observers are closely watching it. The privacy advocates argue that the Act's verification infrastructure could lead to expanded surveillance powers as a result of its comparison to the European Union's more restrictive policies toward facial recognition.
There are a number of tools, such as VPNs, that can help individuals protect their privacy if they are used by reputable providers who have strong encryption policies, as well as no-log policies, which are in place to ensure that no data is collected or stored. While such measures are legal, experts caution that they may breach the terms of service of platforms, forcing users to weigh privacy protections versus the possibility of account restrictions when implementing such measures.
The use of "challenge ages" as part of some verification systems is intended to reduce the likelihood that underage users will slip through undetected, since they will be more likely to be detected if an age verification system is not accurate enough. According to Yoti's trials, setting the threshold at 20 resulted in fewer than 1% of users aged 13 to 17 being incorrectly granted access after being set at 20.
Another popular method of accessing a secure account involves asking for formal identification such as a passport or driving licence, and processing the information purely for verification purposes without retaining the information. Even though all pornographic websites must conduct such checks, industry observers believe that some smaller operators may attempt to avoid them out of fear of a decline in user engagement due to the compliance requirement.
In order to take action, many are expected to closely observe how Ofcom responds to breaches. There are extensive enforcement powers that the regulator has at its disposal, which include the power to issue fines up to £18 million or 10 per cent of a company's global turnover, whichever is higher. Considering that Meta is a large corporation, this could add up to about $16 billion in damages. Further, formal warnings, court-ordered site blocks, as well as criminal liability for senior executives, may also be an option.
For those company leaders who ignore enforcement notices and repeatedly fail to comply with the duty of care to protect children, there could be a sentence of up to two years in jail. In the United Kingdom, mandatory age verification has begun to become increasingly commonplace, but the long-term trajectory of the policy remains uncertain as we move into the era.
Even though it has been widely accepted in principle that the program is intended to protect minors from harmful digital content, its execution raises unresolved questions about proportionality, security, and unintended changes to the nation's internet infrastructure. Several technology companies are already exploring alternative compliance methods that minimise data exposure, such as the use of anonymous credentials and on-device verifications, but widespread adoption of these methods depends on the combination of the ability to bear the cost and regulatory endorsement.
It is predicted that future amendments to the Online Safety Act- or court challenges to its provisions-will redefine the boundary between personal privacy and state-mandated supervision, according to legal experts. Increasingly, the UK's approach is being regarded as an example of a potential blueprint for similar initiatives, particularly in jurisdictions where digital regulation is taking off.
Civil liberties advocates see a larger issue at play than just age checks: the infrastructure that is being constructed could become a basis for more intrusive monitoring in the future. It will ultimately be decided whether or not the Act will have an enduring impact based on not only its effectiveness in protecting children, but also its ability to safeguard the rights of millions of law-abiding internet users in the future.
The Python Package Index (PyPI) website is being used to launch sophisticated phishing campaigns targeting Python developers, highlighting the ongoing threats that open-source ecosystems face. The phishing campaign is utilising a counterfeit version of the website to target Python developers.
In an official advisory issued earlier this week by the Python Software Foundation (PSF), attackers have warned developers against defrauding them of their login credentials by using the official PyPI domain for their phishing campaign.
Despite the fact that PyPI's core infrastructure has not been compromised, the threat actors are distributing deceptive emails directing recipients to a fake website that closely resembles the official repository of PyPI. Because PyPI is the central repository for publishing and installing third-party Python libraries, this campaign poses a significant threat to developers' accounts as well as to the entire software supply chain as a whole.
In addition to using subtle visual deception, social engineering techniques are also used by attackers to craft phishing emails that appear convincingly legitimate to unsuspecting recipients of the emails. A subject line of the email normally reads "[PyPI] Email verification." These emails are typically sent to addresses harvested from the Python Package Index metadata of packages.
A noteworthy aspect of the spam emails is that they are coming from email addresses using the domain @pypj.org, a nearly identical spoof of the official @pypi.org domain—only one character in the spoof differs, where the legitimate “i” is replaced by a lowercase “j”.
To verify the authenticity of the email address, developers are asked to click a link provided in the email that directs them to a fake website that is meticulously designed to emulate the authentic PyPI interface in every way possible. This phishing site takes the victims’ passwords and forwards them to PyPI's official website in a particularly deceptive way, effectively logging them in and masking the fact that they have been cheated, which leaves many unaware of the security breach.
As a result, PyPI maintainers have urged all users who have interacted with the fraudulent email to change their passwords as soon as possible and to review their "Security History" in order to look for unauthorised access signs.
Among the many examples of targeted deception within the developer ecosystem, threat actors have not only impersonated trusted platforms such as PyPI but also expanded their phishing campaigns to include developers of Firefox add-ons as part of a broader pattern of targeted deception. As part of the PyPI-focused attacks, developers are required to verify their email addresses by clicking on a link that takes them to a fake PyPI site that has an interface that is nearly identical to the legitimate PyPI site.
One of the most insidious aspects of this scam is the ability of the hacker to harvest login credentials and transmit them directly to PyPI's real site, thereby seamlessly logging in victims and concealing the breach. This clever redirection often leaves developers unaware that their credentials were compromised due to this clever redirection.
There have been several reports this week about phishing campaigns targeting Firefox extension developers, including a parallel phishing campaign that has been launched to target Firefox extension developers as well. The PyPI team has advised any affected users to change their passwords immediately and check the Security History section for any signs of unauthorised access.
Despite the fact that these emails falsely claim to originate from Mozilla or its Add-ons platform (AMO), they are instructing recipients to update their account details to maintain access to developer features. Upon closer examination, however, it is evident that these messages are not sophisticated at all: some of them are sent from generic Gmail accounts, and sometimes the word "Mozilla" is even misspelt, missing one letter from the “l” on some occasions.
As a result of these warnings, the exploitation of platform trust remains one of the most powerful ways in which developers can compromise their accounts across a wide range of ecosystems. As social engineering threats have increased across the software supply chain, the Python Software Foundation (PSF) and other ecosystem stewards continue to face increasingly sophisticated phishing and malware attacks regularly.
The PyPI Foundation has introduced a new feature known as Project Archival, which allows PyPI publishers to formally archive their projects, signalling to users that they will not be receiving any further updates shortly. In March 2024, PyPI was forced to temporarily suspend new user registrations as well as the creation of new projects due to a malware campaign in which hundreds of malicious packages disguised as legitimate tools were uploaded.
These efforts were soon tested by PyPI. A response to the issue has been issued by PyPI, which has urged users to be vigilant by inspecting browser URLs carefully before logging in to their accounts and not clicking links from suspicious emails. It's interesting to note that similar attacks have also been aimed at the NPM registry recently. This time, however, they are using typosquatted domains-npnjs[.]com instead of npmjs[.]com-to send credential-stealing email verification messages to the registry.
Several npm packages were compromised as a result of that campaign, which were then weaponised to deliver malware dubbed Scavenger Stealer. With this malicious payload, sensitive data could be extracted from browsers, system information could be captured, and it could be exfiltrated through a WebSocket connection in order for it to be exfiltrated.
It has been documented that similar threats have been encountered across GitHub and other developer platforms, using a combination of typosquatting, impersonation, and reverse proxy phishing techniques. It is important to note that these attacks, despite appearing to be so simple to execute, are meant to compromise accounts that maintain widely used packages, which poses a systemic security risk.
For best results, security experts suggest that users verify domain names, use browser extensions that flag suspicious URLs, and use password managers with auto-fill that only allow for trusted domains in order to reduce the possibility of exposure. There has been an increase in phishing and typosquatting campaigns targeting software registries like PyPI, npm, and GitHub, which is indicative of a larger and more serious trend in exploiting developer trust by hacking.
In light of these incidents, developers, maintainers, and platform providers must establish enhanced security hygiene measures. Even though open-source ecosystems continue to serve as the foundation for modern software infrastructure, it is clear that the consequences of compromised developer accounts are no longer limited to individual projects. They are now threatening the integrity of the global software supply chain as a whole.
Developers must take proactive measures in light of this shifting landscape by treating unexpected account verification requests with scepticism, verifying domain identity character by character, and implementing multi-layered security safeguards such as two-factor authentication and password managers that are security-conscious.
A push is also being made for platform operators to accelerate investment in the detection of threats, communication transparency, and education of their users. Ultimately, the community will be able to defend itself against these low-tech, but highly impactful, attacks by recognising deception before it can cause damage.
The sophistication of threat actors is allowing them to exploit familiarity and automation to their advantage, making security the first principle to be put forward across the development ecosystem to ensure resilience to attacks.
One of the most chilling reminders of how threat landscapes are evolving even to the most fortified sectors is a major cyber breach that has hit the core of France’s naval defence ecosystem, the Naval Group. Naval Group—widely regarded as one of the nation’s key innovators in the maritime industry—has been compromised by a calculated cyberattack that compromised its reputation for operational secrecy.
Almost 13 gigabytes of highly sensitive data, including technical documentation, submarine combat software components, internal communications, as well as decades-old audio recordings from submarine monitoring systems, were discovered on the internet. It was discovered that virtual machine containers, detailed architecture schematics, and proprietary system blueprints belonging to Naval Group engineers were found in the leak, as well as virtual machine containers.
A silent and strategic adversary was responsible for the intrusion, as it lacked digital vandalism or extortion demands. In spite of the fact that attribution is still unclear, there is speculation that nation-state actors could have been involved in espionage as well as independent threat groups that were seeking disruption or strategic leverage.
However, what remains undeniable is the scale and intent of the breach. This was a precise attack against an impenetrable defence network that was once considered impenetrable and unbreakable. Adding to the fragility of national defence and digital security, French naval defence contractor Naval Group has been the target of scrutiny after claims of a significant cyberattack that have raised concerns about the company's operations.
An anonymous group operating on the dark web, known as the Black Web forum, has claimed it has accessed and exfiltrated classified information related to key French naval platforms, including the nuclear-powered submarines of the Barracuda class. A month ago, the group released approximately 30 gigabytes of data, including software code from combat management systems, and issued a demand that they be contacted within 72 hours or risk leaking more information.
Despite the fact that the authenticity of these files is still uncertain, cybersecurity experts warn that even partial exposure to such sensitive source code could allow adversaries to gain valuable insight into the performance of weapons, their system architecture, and any vulnerabilities they may be able to exploit. It has been confirmed that Naval Group, owned by the French government in the majority, has begun an urgent technical investigation into the alleged breach.
In response to the incident, the company spokesperson described it as a PR attack rather than a confirmed intrusion into its internal infrastructure, stating that operations across shipyards and naval projects remain undisturbed. However, the strategic implications of this incident remain significant. With the creation of some of France's most advanced maritime defence assets, including the Charles de Gaulle aircraft carrier and the Triomphant submarines, Navy Group has played a crucial role in the nation's defence and that of allies.
The potential impact of a confirmed compromise could include both the threat to homeland security as well as the threat to international trade agreements between Australia, India, and Brazil. The Ministry of Armed Forces has yet to release a statement on the matter, but it has been reported that French cybersecurity agencies are helping to conduct the forensic analysis. In light of increasing concerns about global security in the defense supply chain, Naval Group has issued a formal statement stating that no intrusion has yet been detected on its internal information technology infrastructure, as of yet.
In a statement, the company announced that all of its resources had been mobilised to investigate whether the recently leaked data are authentic, provenance, or owned by the Indian Navy, as they had partnered with Mazagon Dock Shipbuilders to deliver six Scorpene-class submarines to the Indian Navy. In order to conduct the forensic investigation, we are collaborating with French authorities.
A similar incident occurred in 2016, when more than 22,000 classified pages of India's Scorpene submarines were leaked, raising serious concerns over the integrity of India's underwater warfare capabilities, a breach that has echoed this recent incident.
A recent breach could have far-reaching implications, as well as threaten the operational security of other nations that operate Scorpene-class submarines, such as Malaysia, Indonesia, and Chile, if it is verified. According to analysts, such a compromise would have a devastating effect on the international defence manufacturing ecosystem, undermining trust in the protection of military technologies and exposing transnational arms collaborations to systemic vulnerabilities.
Geopolitical tensions are increasingly raging in grey zone conflict - a territory where cyberattacks and information warfare blur the line between peace and hostility, as global defence contractors are becoming very valuable targets. The Naval Group is a cornerstone of France's naval industrial base and is now found at the nexus of this strategic vulnerability.
In addition to providing advanced maritime platforms worldwide to nations like France, France's Nuclear Attack submarines (SSNs) and the Scorpene-class diesel-electric submarines (SSKs) in service with the Indonesian Navy, the company is also a major supplier of advanced military systems. There are also multipurpose French-Italian frigates, the FREMM, which are based in France.
In addition to serving as a technological leader and economic engine, Naval Group also supports tens of thousands of indirect jobs in France since 90% of its added value is generated within the country. The ownership structure of the company further reflects its national significance as well. 62.25 per cent of the company's shareholdings are held by the French state, 35 per cent by Thales, and the rest by its former employees through structured corporate shareholdings.
As strategic autonomy becomes increasingly important in a world where defence is regarded as an important component of economic growth, entities such as Naval Group symbolise more than just the capability to defend oneself; they represent a nation's industrial and strategic sovereignty in an era when strategic autonomy is increasingly emphasised.
In spite of a growing number of high-profile cyber intrusions that target both corporations and governments, the allegations of a breach involving Naval Group are yet another disturbing global trend. Days before, Microsoft disclosed a critical vulnerability in its widely used SharePoint platform, which is believed to have been exploited by Chinese threat actors to gain access to this platform.
Among the affected entities was the U.S. It is the responsibility of the National Nuclear Security Administration to maintain the American nuclear arsenal. This incident did not compromise any classified information, however the growing frequency and ambition of such attacks have raised alarm within international security communities because of the increased frequency and ambition.
With a workforce of more than 15,000 and generating revenue over €4.4 billion annually, Naval Group stands out as one of the world’s leading naval shipbuilders in an increasingly volatile threat landscape. It is an essential industrial asset for the government as a whole. Almost two-thirds of the company is controlled by the French government (holding nearly two-thirds of the equity), and the remainder is controlled by Thales, one of the leading defence conglomerates in the country.
It is not only the incident that has raised concerns about cyber-vulnerabilities within critical infrastructure, but it also emphasises the importance of coordinating resilient strategies across global defence supply chains to reduce the risk of a cyber attack. This incident involving Naval Group happens to fall at a critical moment in the global cybersecurity landscape, as the digital battlefield has become as important as traditional combat zones in terms of importance.
Despite the fact that governments and private companies invest billions in safeguarding technological superiority, the threat of real or perceived exposure of sensitive defence assets is amplifying strategic fears. The reputational and diplomatic fallout for France might be substantial, especially if defence partners start questioning the ability of collaborative programs to survive.
A key concern about the breach is that it has the potential to have a ripple effect: it strikes at the intersection of national security, industrial sovereignty, and global defence cooperation. As a consequence of Naval Group's integral role in multinational defence programs, any compromise could negatively impact not only France but also all of the nations which rely on its software frameworks and platforms.
It is becoming increasingly clear that in an era dominated by digitally enabled espionage, where classified data can be weaponised both for disruption and to provide intelligence, the protection of defence research and development is no longer a siloed responsibility, but rather a shared imperative across allies and defence ecosystems.
Aside from that, this breach serves as a stark reminder that cyber intrusions don't necessarily show up in the form of ransomware or defacing websites. There were motives underlying the leak in this case that were geopolitical manoeuvres, competitive sabotage, or intelligence collection, based on the absence of financial extortion and the precision of the leak. Therefore, the Naval Group episode should serve as a call to action for the broader defence community, emphasising the urgent need for robust, coordinated cybersecurity defences, cross-border intelligence sharing, and a renewed commitment to both legacy systems and new defence technologies that are being developed.
The Naval Group breach, which occurred in a high-stakes theatre of modern security where digital compromises could undermine years of strategic advantage, goes way beyond just an isolated incident in a theatre with high stakes. It represents not only the vulnerability of defence digitisation and the fragility of strategic partnerships, but also the persistent threats posed by adversaries operating in the shadows that exist today.