Cybersecurity

100+ Malicious Chrome Extensions Target Users to Harvest Login Credentials and Run Remote Code

A threat actor has orchestrated a sustained campaign to create and distribute over 100 malicious Chrome browser extensions since at least February 2024, leveraging...

Hackers May Exploit Google Cloud Platform to Launch Malicious Attacks

Security researchers have revealed new methods by which attackers could potentially exploit Google Cloud Platform (GCP) services, particularly leveraging vulnerabilities in Cloud Functions and...

Hackers Deploy Counterfeit AI Tool, Targeting 6 Million Users

A coordinated cyber threat campaign emerged, leveraging the meteoric rise of AI media generation platforms to distribute malicious payloads globally. Security researchers at Check Point...

New O365 Phishing Campaign Leverages AES and Malicious npm Packages to Capture User Credentials

Fortra’s Suspicious Email Analysis (SEA) team uncovered a highly sophisticated phishing campaign targeting Microsoft O365 users, marking a significant escalation in the technical complexity...

Hazy Hawk Exploits DNS Vulnerabilities to Hijack Cloud Resources and Spread Malware

A new and sophisticated cyber threat actor, dubbed Hazy Hawk, has emerged as a major risk to organizations worldwide by hijacking abandoned cloud resources...

Popular

Subscribe

spot_imgspot_img