Browser Hijack
-
Posted: November 13, 2025Views: 35Read moreMaverick spreads via WhatsApp to steal bank credentials—learn about its tactics, links to Coyote, and defenses against messaging-based threats.
-
Read moreAI browsers like Atlas bypass paywalls—learn the techniques, risks to publishers, and defenses to protect your content.
-
Read moreCVE-2025-54236 in Adobe Magento allows account hijacking—learn about active exploits, risks, and urgent patching needs to secure your e-commerce platform.
-
Read more131 rebranded Chrome extensions spam Brazilian users via WhatsApp—learn about the violations, white-label model, and tips to avoid risky add-ons and protect your messaging.
-
Posted: October 14, 2025Views: 41Read moreKandji uncovers a September 2025 campaign where attackers clone Homebrew sites to inject malware like Odyssey Stealer via clipboard tricks—exploit C2 servers and bypass trust; mitigate by verifying sources and using endpoint monitoring.
-
Read moreAttackers use zero-day in Edge's IE Mode Chakra engine to trick users into legacy reloads, enabling RCE and SYSTEM access for malware. Microsoft disabled easy triggers—configure manually via Settings, migrate from IE, and prioritize modern web standards to stay secure.
-
Read morePublic Wi-Fi exposes you to MitM attacks and data theft—learn to spot evil twin hotspots, use VPNs for encryption, enable 2FA, and stick to cellular for sensitive tasks to protect against rising breaches in cafes and airports.
-
Read moreLayerX uncovers CometJacking, exploiting Perplexity’s AI browser via malicious URLs to steal Gmail/Calendar data—tricks AI into Base64-encoded exfiltration, bypassing safeguards. Urgent call for AI security-by-design amid rising agentic threats.
-
Read moreMalicious browser extensions SocialMetrics Pro and Madgicx Plus steal Facebook session cookies and credentials to hijack Meta Business accounts. Learn how these fake tools target advertisers via malvertising and fake websites.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.