LATEST

After ownership is transferred, the Chrome extension becomes malicious, allowing code injection and data theft.

After ownership is transferred, the Chrome extension becomes malicious, allowing code injection and data theft.

Following what appears to be a case of ownership transfer, two Google Chrome extensions have turned malicious, giving attackers a means to harvest.

When Auto-Updates Become Attack Paths

When Auto-Updates Become Attack Paths

The idea that utilizing an application's internal update mechanisms is advantageous is a common pattern in enterprise environments, which is worth.

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

In order to spread a remote access trojan (RAT), threat actors are tricking unsuspecting users into using trojanized gaming utilities that are distributed.

OpenAI Rolls Out Codex Security in Research Preview for Context‑Aware Vulnerability Detection

OpenAI Rolls Out Codex Security in Research Preview for Context‑Aware Vulnerability Detection

CYBER ATTACKZerowl

Codex Security, an advanced application security agent created to automate vulnerability detection and remediation, has been formally introduced by.

OpenAI Confirms ChatGPT’s Role In Chinese Cyberattack Campaigns

OpenAI Confirms ChatGPT’s Role In Chinese Cyberattack Campaigns

CYBER ATTACKZerowl

A group of threat actors, including those associated with China and Russia, were discovered using ChatGPT to support malicious cyber and influence.

North Korean APT37 Hackers Leverages Novel Malware to Infect Air‑Gapped Systems

North Korean APT37 Hackers Leverages Novel Malware to Infect Air‑Gapped Systems

CYBER ATTACKZerowl

Threat group APT37, which has ties to North Korea, has launched a sophisticated new campaign that uses a new set of malware tools that are specifically.

Microsoft Defender Uncovers Trojanized Gaming Utility Campaign Targeting Users with RATs and Remote Data Theft

Microsoft Defender Uncovers Trojanized Gaming Utility Campaign Targeting Users with RATs and Remote Data Theft

CYBER ATTACKZerowl

By concealing malware inside gaming tools that appear entirely legitimate, cybercriminals have discovered a new method of getting past users' defenses.

Microsoft Defender Expands URL Click Alerts to Include Microsoft Teams for Enhanced Security Visibility

Microsoft Defender Expands URL Click Alerts to Include Microsoft Teams for Enhanced Security Visibility

CYBER ATTACKZerowl

URL Alert Teams for Microsoft Defender By adding Microsoft Defender for Office 365 (MDO) URL click alerts to Microsoft Teams, Microsoft is fortifying its.

Juniper Networks PTX Vulnerability Enables Full Router Takeover

Juniper Networks PTX Vulnerability Enables Full Router Takeover

CYBER ATTACKZerowl

An out-of-cycle security bulletin has been released by a major networking vendor to fix a serious flaw in its Junos OS Evolved software that specifically.

Top 5 this week

Page 78 of 201