Google Chrome Update Disrupts Infostealer Cookie Theft
Google has launched a new security feature for Chrome on Windows to prevent session theft by hackers. This update, called Device Bound Session Credentials (DBSC),…
Google has launched a new security feature for Chrome on Windows to prevent session theft by hackers. This update, called Device Bound Session Credentials (DBSC),…
I just blinked and the first quarter of the year is GONE. Where does the time go? I looked back at my article from last…
An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle…
Google has announced the rollout of new session cookie protections in Chrome to prevent account compromise via stolen authentication cookies. The feature, called Device Bound…
CVE-2026-39987: Marimo RCE exploited in hours after disclosure Pierluigi Paganini April 11, 2026 A critical flaw, tracked as CVE-2026-39987, in the open-source Python notebook tool…
What is often overlooked is how traffic enters and moves through the environment before those controls are applied. The traffic layer includes ingress paths, load…
When Chris Bisnett, John Ferrell, and I founded Huntress in 2015, our goal was simple: make a difference. We were a team of three with…
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees’ salary payments after hijacking their accounts in payroll redirection (also known as payroll…
Google has officially rolled out End-to-End Encryption (E2EE) for the Gmail application on Android and iOS devices. This major update targets users utilizing Gmail client-side…
Amid horrific threats from United States president Donald Trump as the US and Iran negotiated a ceasefire, the US government warned this week that Iran-linked…
Google has officially launched a major security upgrade to protect users from session hijacking. Starting with Chrome version 146 for Windows users, Device Bound Session…
Every organization contends with digital exposure. Isolated data points reside across fragmented public sources, yet search engines, data brokers, and people-search aggregators weave this dispersed…