Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited ...
LockBit, Lynx, and Virlock dominate 2025 ransomware threats, targeting businesses with double extortion, data breaches, and ...
HellCat and Morpheus ransomware share identical code, relying on the Windows Cryptographic API for encryption.
Attackers have been able to inject malicious code into the Gdata Security Client antivirus and the Gdata Management Server ...
When the user agrees to the sync, they unwittingly send all their local browser data, such as saved passwords, browsing ...
A new attack called 'Browser Syncjacking' demonstrates the possibility of using a seemingly benign Chrome extension to take ...
Hackers have devised a new attack method that uses a seemingly harmless Chrome extension to take over devices and steal ...
A new attack called ‘Browser Syncjacking’ has been discovered by security researchers at the cybersecurity firm SquareX ...
Attackers send out fake job offers and trick individuals into running a cross-platform JavaScript stealer for crypto theft and persistence.
SquareX discloses a new attack technique that shows how malicious extensions can be used to completely hijack the browser, ...
SquareX discloses a new attack technique that shows how malicious extensions can be used to completely hijack the browser, and eventually, the whole device. Browser extensions have been under the ...