Tuesday, March 25, 2025

Browser

Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware

In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according to Ontinue's latest Threat Intelligence...

New Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers

A sophisticated phishing campaign has been uncovered by Silent Push threat analysts, employing the browser-in-the-browser (BitB) technique to target gamers, particularly those playing Counter-Strike...

Rilide Malware Poses as Browser Extension to Steal Login Credentials from Chrome and Edge Users

Rilide, a sophisticated malware, has been masquerading as a legitimate browser extension to steal sensitive information from users of Chromium-based browsers like Google Chrome...

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications

A new strain of malware, known as SvcStealer, has emerged as a significant threat in the cybersecurity landscape.This malware is primarily delivered through...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane, which is distributed through YouTube videos promoting game cheats.This campaign...

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers to hijack user sessions...

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an unexpected addition, Filebroser, a rebranded version of the open-source File...

Activating Incognito Mode in RDP to Erase All Traces

The Remote Desktop Protocol (RDP) is a widely used tool for remote access, but it often leaves behind traces of user activity, which can...

Peaklight Malware Targets Users to Steal Credentials, Browser History, and Financial Data

Peaklight malware has emerged as a significant threat, designed to steal sensitive information from compromised endpoints.This information stealer is often distributed through underground...

Over 35,000 Websites Hacked to Inject Malicious Scripts Redirecting Users to Chinese Websites

In a widespread cyberattack, over 35,000 websites have been compromised by a malicious campaign that injects harmful scripts into their codebase.The injected scripts...

Hackers Drop NetSupport RAT & StealC Malware on Your Windows Via Fake Browser Updates

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by the threat actor group SmartApeSG, also known as ZPHP or HANEYMANEY.This campaign exploits...