X

Vous n'êtes pas connecté

  - BLEEPINGCOMPUTER.COM - A La Une - 31/12/2024 18:54

New details reveal how hackers hijacked 35 Google Chrome extensions

New details have emerged about a phishing campaign targeting Chrome browser extension developers that led to the compromise of at least thirty-five extensions to inject data-stealing code, including those from cybersecurity firm Cyberhaven. [...]

Articles similaires

Sorry! Image not available at this time

Taking over millions of developers exploiting an Open VSX Registry flaw

securityaffairs.co - 27/Jun 19:37

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks....

Sorry! Image not available at this time

Taking over millions of developers exploiting an Open VSX Registry flaw

securityaffairs.co - 27/Jun 19:37

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks....

Sorry! Image not available at this time

Taking over millions of developers exploiting an Open VSX Registry flaw

itsecuritynews.info - 27/Jun 20:34

A critical flaw in Open VSX Registry could let attackers hijack the VS Code extension hub, exposing millions of developers to supply chain attacks....

North Korean hackers are hijacking Zoom calls to steal your crypto with scripts buried 10,000 lines deep

lovablevibes.co - 26/Jun 20:03

Fake Zoom scripts launch malware hidden beneath thousands of lines of code and whitespace LaunchDaemons ensure the malware runs at boot with admin...

Sorry! Image not available at this time

Chinese Hackers Deploying Pubload Malware by Weaponizing Tibetan Community Lures & Filenames

itsecuritynews.info - 26/Jun 10:32

A sophisticated cyberattack campaign targeting the Tibetan community has emerged, with China-aligned threat actors deploying advanced malware through...

New hires are cybersecurity goldmines for hackers, and most companies don’t even realize they’re making it easy

lovablevibes.co - 30/Jun 21:26

Most phishing incidents happen before new employees even understand how internal systems work, report claims Security awareness should begin on day...

New hires are cybersecurity goldmines for hackers, and most companies don’t even realize they’re making it easy

lovablevibes.co - 30/Jun 21:26

Most phishing incidents happen before new employees even understand how internal systems work, report claims Security awareness should begin on day...

Sorry! Image not available at this time

New macOS Malware Employs Process Injection and Remote Communications to Exfiltrate Keychain Credentials

itsecuritynews.info - 03/Jul 06:33

A sophisticated new macOS malware campaign has emerged targeting Web3 and cryptocurrency platforms, employing advanced techniques rarely seen in...

Sorry! Image not available at this time

New macOS Malware Employs Process Injection and Remote Communications to Exfiltrate Keychain Credentials

itsecuritynews.info - 03/Jul 06:33

A sophisticated new macOS malware campaign has emerged targeting Web3 and cryptocurrency platforms, employing advanced techniques rarely seen in...

Sorry! Image not available at this time

Anthropic MCP Inspector Vulnerability Lets Hackers Run Arbitrary Code Remotely

itsecuritynews.info - 02/Jul 05:40

A newly disclosed vulnerability in Anthropic’s Model Context Protocol (MCP) Inspector tool has sent shockwaves through the AI development community,...