Hackers Hijacked 16 Chrome Extensions to Inject Malicious Code
In a sophisticated cyberattack campaign that began in mid-December, hackers have compromised at least 16 Chrome browser extensions, exposing over...
Read more →In a sophisticated cyberattack campaign that began in mid-December, hackers have compromised at least 16 Chrome browser extensions, exposing over...
Read more →Major U.S. telecom companies AT&T Inc. and Verizon Communications Inc. confirmed they were targeted by the China-linked hacking group known...
Read more →The White House has confirmed that a ninth U.S. telecommunications company has fallen victim to the ‘Salt Typhoon’ campaign, a...
Read more →Volkswagen has inadvertently exposed the personal information of 800,000 electric vehicle owners, including their location data and contact details. The...
Read more →Cyberhaven, a leading provider of data loss prevention (DLP) solutions, disclosed a significant security breach involving its Chrome extension. On...
Read more →Palo Alto Networks has disclosed a high-severity vulnerability, CVE-2024-3393, in its PAN-OS software that powers its next-generation firewalls. The flaw...
Read more →A surge in cyberattacks leveraging legacy vulnerabilities in D-Link routers has been detected, with two botnets, FICORA and CAPSAICIN, actively...
Read more →OpenAI’s flagship AI service, ChatGPT, along with its associated services like the API and Sora, experienced a significant global outage,...
Read more →The cryptocurrency industry faced another challenging year in 2024, as hacking incidents reached new heights, with $2.2 billion in digital...
Read more →The cybersecurity research team at ANY.RUN, leveraging their Interactive Sandbox and Threat Intelligence Lookup tools, has uncovered and analyzed a...
Read more →A new critical vulnerability (CVE-2024-52046) has been discovered in Apache MINA, potentially allowing attackers to execute remote code by exploiting...
Read more →A newly disclosed high-impact vulnerability in Dell’s widely used SupportAssist software could allow attackers to escalate privileges on affected systems....
Read more →