100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

3 min read
admin
May 20, 2025
An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024...
admin
May 20, 2025
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that...
admin
May 20, 2025
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as...
admin
May 20, 2025
In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200...
admin
May 20, 2025
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed...
admin
May 20, 2025
Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers.
The...
admin
May 19, 2025
The official site for RVTools has been hacked to serve a compromised installer for the popular VMware...
admin
May 19, 2025
Several ransomware actors are using a malware called Skitnet as part of their post-exploitation efforts to steal...
admin
May 19, 2025
Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic...
admin
May 19, 2025
Mozilla has released security updates to address two critical security flaws in its Firefox browser that could...
admin
May 19, 2025
Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s...
admin
May 16, 2025
Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to...
admin
May 16, 2025
Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber...
admin
May 16, 2025
Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel...
admin
May 16, 2025
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode...
admin
May 16, 2025
Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in...
admin
May 15, 2025
Austrian privacy non-profit noyb (none of your business) has sent Meta's Irish headquarters a cease-and-desist letter, threatening...
admin
May 15, 2025
Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data...
admin
May 15, 2025
Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance....
admin
May 15, 2025
Google on Wednesday released updates to address four security issues in its Chrome web browser, including one...