ποΈ Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data. The extensions in question, both originally associated with a developer named "akshayanuonlinegmail.com" BuildMelon, are listed below QuickLens Search Screen with.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Highvalue organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as part of a yearslong campaign. The activity, which has targeted aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications sectors, has been attributed by Palo Alto Networks Unit 42 to a previously undocumented threat activity group dubbed.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π¨ International security chiefs to convene in Glasgow for flagship CYBERUK conference π¨
π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity Resilience, Technology, Threat, and Ecosystem.π Read more.
π Via "UK NCSC"
----------
ποΈ Seen on @cibsecurity
National Cyber Security Centre - NCSC.GOV.UK
International security chiefs to convene in Glasgow for flagship CYBERUK conference
CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity: Resilience, Technology, Threat, and Ecosystem.
π Face value: What it takes to fool facial recognition π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
ESETs Jake Moore used smart glasses, deepfakes and face swaps to hack widelyused facial recognition systems and he'll demo it all at RSAC 2026.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Face value: What it takes to fool facial recognition
ESETβs Jake Moore used smart glasses, deepfakes and face swaps to βhackβ widely-used facial recognition systems β and he'll demo it all at RSAC 2026.
π Cyber fallout from the Iran war: What to have on your radar π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
The cybersecurity implications of the war in the Middle East extend far beyond the region. Heres where to focus your defenses.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Cyber fallout from the Iran war: What to have on your radar
The cybersecurity implications of the war in the Middle East extend far beyond the region. Hereβs where to focus your defenses.
π Sednit reloaded: Back in the trenches π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
The resurgence of one of Russias most notorious APT groups.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Sednit reloaded: Back in the trenches
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants β BeardShell and Covenant.
π Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Operation Lightning sees international law enforcement partners shut down SocksEscort, a major malicious proxy service used by cybercriminals worldwide.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Law Enforcement Dismantles SocksEscort Proxy Network
Operation Lightning sees international law enforcement partners shut down βSocksEscort,β a major malicious proxy service used by cybercriminals worldwide
π PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
PixRevolution Android trojan hijacks Brazils PIX payments in real time using accessibility abuse.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time
PixRevolution Android trojan hijacks Brazilβs PIX payments in real time using accessibility abuse
π Critical Zero-Click Flaw in n8n Allows Full Server Compromise π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The critical vulnerability affecting both cloud and selfhosted n8n instances requires no authentication or even n8n account to be exploited.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
CISA issued urgent directive as attackers exploit Cisco SDWAN flaw granting admin access to networks.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
CISA Issues Emergency Directive Over Exploited Cisco SD-WAN Flaws
CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks
π Police Scotland Fined After Sharing Victimβs Phone Data π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The ICO has fined Police Scotland after it shared the entire contents of a victims phone with her alleged attacker.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Police Scotland Fined After Sharing Victimβs Phone Data
The ICO has fined Police Scotland after it shared the entire contents of a victimβs phone with her alleged attacker
π Iran Claims Massive Cyber-Attack on MedTech Firm Stryker π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The proIran Handala group claims to have wiped 200,000 systems in destructive wiper malware attack on US firm Stryker.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Iran Claims Massive Cyber-Attack on MedTech Firm Stryker
The pro-Iran Handala group claims to have wiped 200,000 systems in destructive cyber-attack on US firm Stryker
π France: National Cybersecurity Agency Reports Ransomware Attack Drop in 2025 π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
French small and medium businesses remained the organizations most targeted by ransomware in 2025.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Interpol's 'Operation Synergia III' Nets 94 Arrests in Major Cybercrime Sweep π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
A new law enforcement operation against phishing and ransomware operators led to the takedown of 45,000 malicious IP addresses.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
π Infosecurity Europe Announces 2026 Keynote Line Up π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Europe 2026 reveals its keynote lineup, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Infosecurity Europe Announces 2026 Keynote Line Up
Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats
π Law Enforcement Dismantles SocksEscort Proxy Network in Operation Lightning π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Operation Lightning sees international law enforcement partners shut down SocksEscort, a major malicious proxy service used by cybercriminals worldwide.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Law Enforcement Dismantles SocksEscort Proxy Network
Operation Lightning sees international law enforcement partners shut down βSocksEscort,β a major malicious proxy service used by cybercriminals worldwide
π Researchers Uncover βLeakyLookerβ Vulnerabilities in Google Looker Studio π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
LeakyLooker flaws in Google Looker Studio let attackers run crosstenant SQL attacks on cloud data.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Researchers Uncover βLeakyLookerβ Vulnerabilities in Google Looker
LeakyLooker flaws in Google Looker Studio let attackers run cross-tenant SQL attacks on cloud data
π PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
PixRevolution Android trojan hijacks Brazils PIX payments in real time using accessibility abuse.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
PixRevolution Malware Hijacks Brazil's PIX Transfers in Real Time
PixRevolution Android trojan hijacks Brazilβs PIX payments in real time using accessibility abuse
π Compromised WordPress Sites Deliver ClickFix Attacks in Global Infostealer Campaign π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Over 250 legitimate websites, including news outlets and a US Senate candidates official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Compromised WordPress Sites Deliver ClickFix Attacks
Over 250 legitimate websites, including news outlets and a US Senate candidateβs official webpage, been compromised to infect visitors with infostealers, warn Rapid7 researchers
π Critical Zero-Click Flaw in n8n Allows Full Server Compromise π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
The critical vulnerability affecting both cloud and selfhosted n8n instances requires no authentication or even n8n account to be exploited.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity