Wednesday, August 31, 2022

Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users

The Hacker News Daily Updates
Newsletter
cover

SASE for Dummies 2nd Edition

SASE for Dummies 2nd edition is here. Understand all the SASE basics, and much more. It’s a concise, 5-chapter, a must-read for IT leaders looking to support their digital business needs today and into the future.

Download Now Sponsored
LATEST NEWS Aug 31, 2022

Experts Find Malicious Cookie Stuffing Chrome Extensions Used by 1.4 Million Users

Five imposter extensions for the Google Chrome web browser masquerading as Netflix viewers and others have been found to track users' browsing activity and profit of retail affiliate programs. "The extensions offer various functions such as enabling users to watch Netflix shows together, website ...

Read More
Twitter Facebook LinkedIn

Hackers Hide Malware in Stunning Images Taken by James Webb Space Telescope

A persistent Golang-based malware campaign dubbed GO#WEBBFUSCATOR has leveraged the deep field image taken from NASA's James Webb Space Telescope (JWST) as a lure to deploy malicious payloads on infected systems. The development, revealed by Securonix, points to the growing adoption of Go among ...

Read More
Twitter Facebook LinkedIn

Interested in Reducing Your Risk Profile? Jamf Has a Solution for That

The threat landscape has changed dramatically over the past decade. While cybercriminals continue to look for new ways to gain access to networks and steal sensitive information, the mobile attack surface is also expanding. Mobile devices are not only becoming more powerful but also more ...

Read More
Twitter Facebook LinkedIn

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks

Google on Monday introduced a new bug bounty program for its open source projects, offering payouts anywhere from $100 to $31,337 (a reference to eleet or leet) to secure the ecosystem from supply chain attacks. Called the Open Source Software Vulnerability Rewards Program (OSS VRP), the offering ...

Read More
Twitter Facebook LinkedIn

Chinese Hackers Used ScanBox Framework in Recent Cyber Espionage Attacks

A months-long cyber espionage campaign undertaken by a Chinese nation-state group targeted several entities with reconnaissance malware so as to glean information about its victims and meet its strategic goals. "The targets of this recent campaign spanned Australia, Malaysia, and Europe, as well ...

Read More
Twitter Facebook LinkedIn
cover

How Hackers Plan Their Attacks and How to Defend Against Them

To defend your business from hackers, you must understand how they work. Learn about the common types of phising attacks and how to get ahead with advanced threat protection.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home