AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code
The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain attack. The payload can intercept cryptocurrency…
The AppsFlyer Web SDK was temporarily hijacked this week with malicious code used to steal cryptocurrency in a supply-chain attack. The payload can intercept cryptocurrency…
Authorities Dismantle Malicious Proxy Service An international law enforcement operation led by the U.S. Justice Department has successfully dismantled SocksEscort, a massive residential proxy network.…
A financially motivated threat actor tracked as Storm-2561 is running a credential theft campaign that abuses SEO poisoning and fake, signed VPN installers to steal…
A coordinated international law enforcement operation has dismantled SocksEscort (socksescort.com), a large proxy service that routed cybercriminal traffic through thousands of compromised home and small…
Developers install external libraries with a single command, and that step can introduce more code than expected into a project environment. Dependency resolution inside package…
Meta has rolled out more anti-scam protections across WhatsApp, Facebook, and Messenger to fight sophisticated fraud tactics. The features will help stop celebrity impersonators and…
Ravie LakshmananMar 13, 2026Browser Security / Vulnerability Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it…
When US president Trump implemented sanctions against the International Criminal Court (ICC) in February 2025, it wasn’t long before ICC chief prosecutor Karim Khan found…
Australian Unity’s efforts to standardise and ‘shift left’ code quality and security checks for all its development activity and codebases have set it up for…
Google fixed two new actively exploited flaws in the Chrome browser Pierluigi Paganini March 13, 2026 Google addressed two high-severity vulnerabilities in the Chrome browser…
An Iran-linked hacking group claimed responsibility Wednesday for a cyberattack on US medical technology giant Stryker, saying it had extracted 50 terabytes of data in…
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com Die Security-Performance zu messen, gehört vielleicht nicht zu den…