South Korean e-commerce giant Coupang has unveiled a sweeping compensation initiative totaling $1.17 billion (approximately 1.685 trillion won) following a large-scale data breach that affected an estimated 33.7 million customers. The incident, publicly disclosed in late November 2025, stands as one of the most significant data security events in South Korea’s history. Coupang stated that the compensation plan is intended to address customer concerns, mitigate reputational damage, and demonstrate accountability after widespread exposure of personal information. The scale of both the breach and the response has drawn intense public, regulatory, and industry attention, highlighting the growing expectations placed on major digital platforms to safeguard user data. According to disclosures made in 2025, the compromised data included customer names, email addresses, physical delivery addresses, and order-related details. Investigations suggested that the breach may have persisted undetected for several months, raising questions about internal monitoring and access controls. The incident was ultimately traced back to a former employee who allegedly retained unauthorized access to internal systems after leaving the company. In response, Coupang cooperated with law enforcement authorities and engaged multiple cybersecurity firms to assist with forensic analysis and the recovery of devices believed to have been used during the incident. While authorities continue to examine the full scope and long-term impact of the breach, Coupang has maintained that the former employee only retained data associated with a limited subset of approximately 3,000 accounts. The company further asserted that there is no evidence the information was sold, shared, or otherwise distributed before it was deleted. Despite these assurances, the magnitude of the exposed customer base prompted national police involvement and heightened regulatory scrutiny, reinforcing the breach’s significance as a landmark case in South Korea’s data protection landscape.
Apple researchers have disclosed a critical macOS vulnerability, tracked as CVE-2025-43530, that allows attackers to bypass the Transparency, Consent, and Control (TCC) security fr...
Cybersecurity analysts have recently uncovered two malicious browser extensions hosted on the Chrome Web Store that are covertly collecting conversations from AI platforms such as ...
The CERT Coordination Center (CERT/CC) has disclosed a serious unpatched security vulnerability affecting the TOTOLINK EX200 wireless range extender that could allow an attacker to...