LinkedIn secretly scans for 6,000+ Chrome extensions, collects data
markdown Image: LinkedIn homepage BrowserGate Report: LinkedIn’s Hidden Extension‑Scanning Scripts A new report dubbed “BrowserGate” warns that Microsoft’s Link...
markdown Image: LinkedIn homepage BrowserGate Report: LinkedIn’s Hidden Extension‑Scanning Scripts A new report dubbed “BrowserGate” warns that Microsoft’s Link...
Background The Wall Street Journal shares the wild behind‑the‑scenes storyhttps://www.wsj.com/tech/kimwolf-hack-residential-proxy-networks-a712ab59 of how the...
!https://www.bleepstatic.com/content/hl-images/2026/04/03/hims-hers.jpg Background Telehealth giant Hims & Hers Health is an American company specializing in di...
A China-aligned threat actor has set its sights on European government and diplomatic organizations since mid‑2025, following a two‑year period of minimal targe...
!https://www.bleepstatic.com/content/hl-images/2026/04/03/DieLinke.jpg The Qilin ransomware group has stolen data from Die Linke, a German democratic‑socialist...
The European Union’s cybersecurity agency said Thursday that a recent hack and data breach at the EU’s executive body was the work of a cyber‑criminal group kno...
> Threat actors are increasingly using HTTP cookies as a control channel for PHP‑based web shells on Linux servers to achieve remote code execution, according t...
Here’s a cleaned‑up version of the markdown with proper formatting and a descriptive alt‑text for the image: markdown !Cyber hand illustrationhttps://www.bleeps...
WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publisheshttps://www.404media.co/this-company-is-secretl...
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of a highly targeted social engineering campaign orchestra...
The Emerging Threat Landscape The next major breach hitting your clients probably won't come from inside their walls. It’ll come through a vendor they trust, a...
Incident Overview Drift Protocol, the largest open‑source perpetual futures exchange on Solana, announced on its X accounthttps://x.com/DriftProtocol/status/20...
Incident Overview Iran's Islamic Revolutionary Guard Corps IRGC said on Thursday that it had hit a data center linked to Oracle in Dubai as part of its war aga...
Cybersecurity researchers have discovered a new version of the SparkCat malware on the Apple App Store and Google Play Store, more than a year after the trojan...
!https://www.bleepstatic.com/content/hl-images/2025/11/10/Hacker-IAB.jpg Incident Overview A former core infrastructure engineer pleaded guilty to locking Windo...
The Quizlet flashcards, which WIRED found through basic Google searches, seem to include sensitive information about gate security at Customs and Border Protect...
CERT‑EU: European Commission hack exposes data of 30 EU entities By Sergiu Gatlanhttps://www.bleepingcomputer.com/author/sergiu-gatlan/ April 3 2026 – 02:33 AM...
!https://techcrunch.com/wp-content/uploads/2021/08/NYSE-hims-hers-shot1.jpg?w=1024 Image Credits: Hims & Hers / file photo Overview Hims & Hers, the telehealth...
A large‑scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database creden...
!https://www.bleepstatic.com/content/hl-images/2026/03/31/cryptocurrency.jpg Incident Overview The Drift Protocol lost at least $280 million after a threat acto...
Overview A publicly accessible Amazon‑hosted storage server allowed anyone with a web browser to access potentially hundreds of thousands of people’s personal...
!Digital securityhttps://cdn.mos.cms.futurecdn.net/WeMVfhPnXrndGPVkTLYTB9.jpg Image credit: Getty Images Denuvo bypass and the rise of zero‑day repacks A bypass...
ICE’s Use of Paragon Spyware The acting head of U.S. Immigration and Customs Enforcement told lawmakers that ICE has bought and used spyware made by Paragon So...
!https://www.bleepstatic.com/content/hl-images/2026/01/29/internet.jpg Researchers warn that residential proxies used to route malicious traffic are a big probl...
Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, h...
The latest ThreatsDay Bulletin is basically a cheat sheet for everything breaking on the internet right now. No corporate fluff or boring lectures here, just a...
Overview A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans RATs and cryptocurren...
국가정보원N2SF 이해 및 활용 안내 국가정보원이하 국정원은 최근 ‘국가망보안체계N2SF 이해 및 활용 안내’ 자료를 공개했습니다. N2SF는 기존 망분리를 개선한 보안체계로, 업무 정보를 기밀C·민감S·공개O 로 구분하고 등급별로 다른 보안통제를 적용하는 것이 핵심입니다. 이 자료는...
In December 2025, we shared the first‑ever The State of Trusted Open Source report, featuring insights from our product data and customer base on open‑source co...
Overview Security researchers at Google released a report describing “Coruna,” a highly sophisticated iPhone hacking toolkit. The toolkit includes five complet...
Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version of its iOS app that was infected with sp...
!https://www.bleepstatic.com/content/hl-images/2025/10/15/F5-headpic.jpg Internet threat‑monitoring non‑profit Shadowserver has found over 14,000 BIG‑IP APM ins...
Update Expansion Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from the risk pose...
Hackers have targeted TrueConf conference servers in attacks that exploit a zero‑day vulnerability, allowing them to execute arbitrary files on all connected en...
!a photo of an iPhone running iOS 18 held in someone's hand.https://techcrunch.com/wp-content/uploads/2024/06/wwdc24-ios18-homescreen-01.jpg?w=1024 Image Credit...
Cybersecurity researchers have discoveredhttps://www.kaspersky.com/about/press-releases/it-wont-make-you-laugh-itll-make-you-suffer-kaspersky-uncovers-crystalx-...
Overview The 2026 US “Cyber Strategy for America” document is largely a continuation of the White House’s cybersecurity policy from the past decade, but it ado...
WhatsApp says it has notified around 200 users who were tricked into installing a malicious fake version of the chat app that contained government spyware. Noti...
WhatsApp says it has notified around 200 users who were tricked into installing a malicious fake version of the chat app that contained spyware. The company acc...
Overview The Computer Emergency Response Team of Ukraine CERT‑UA has disclosed details of a new phishing campaign in which the cybersecurity agency itself was...
The toy and entertainment giant Hasbro – owner of brands such as Peppa Pig, Transformers, Monopoly, Play‑Doh, Power Rangers, Nerf and Dungeons & Dragons – was h...
Incident Overview American toy‑making giant Hasbro has confirmed a cyberattack and warned that it may take “several weeks” before the incident is fully resolve...
markdown !https://www.bleepstatic.com/content/posts/2026/03/31/blackpoint-hackers-header-image.jpghttp://blackpointcyber.com/webinar/inside-the-soc-ep002-blackp...
There is a character that keeps appearing in enterprise security departments, and most CISOs know exactly who that is. It doesn’t build. It doesn’t enable. Its...
Overview A multi‑pronged phishing campaign is targeting Spanish‑speaking users in organizations across Latin America and Europe to deliver Windows banking troj...
Microsoft is calling attention to a new campaign that has leveraged WhatsApp messages to distribute malicious Visual Basic Script VBS files. The activity, begin...
!https://www.bleepstatic.com/content/hl-images/2022/12/16/FBI__headpic.jpg The U.S. Federal Bureau of Investigation FBI warned Americans against using foreign‑d...
Background If you needed more proof of just how bad the DarkSword spywarehttps://mashable.com/article/iphone-exploit-darksword-spyware-released-in-the-wild is,...