#cross-origin-bypass

[ follow ]
Information security
fromDevOps.com
1 day ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
#google
Privacy technologies
fromPCWorld
3 days ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
Privacy technologies
fromPCWorld
3 days ago

Google will soon penalize sites that hijack your browser's back button

Google will penalize websites that hijack the browser's back button to improve user experience and eliminate frustrating redirects.
#cybersecurity
Information security
fromSecurityWeek
2 days ago

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Senate legislation aims to enhance satellite cybersecurity amid rising threats and vulnerabilities in commercial satellite signals.
Information security
fromThe Hacker News
1 week ago

Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

Compromised npm packages can rapidly affect numerous systems, highlighting the need for enhanced security in software development processes.
Information security
fromSecurityWeek
2 days ago

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Senate legislation aims to enhance satellite cybersecurity amid rising threats and vulnerabilities in commercial satellite signals.
Node JS
fromThe Hacker News
2 weeks ago

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

36 malicious npm packages disguised as Strapi CMS plugins facilitate exploitation and credential harvesting.
Information security
fromThe Hacker News
5 days ago

108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users

A cluster of 108 malicious Chrome extensions collects user data and injects ads, compromising browser security.
Information security
fromThe Hacker News
1 week ago

Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More

Compromised npm packages can rapidly affect numerous systems, highlighting the need for enhanced security in software development processes.
#browser-fingerprinting
fromMUO
2 months ago
Privacy technologies

This tiny Chrome extension fights fingerprinting without breaking sites

A fingerprint-spoofer browser extension can anonymize browser fingerprint data to reduce uniqueness and help users blend into common profiles for improved privacy.
fromMUO
2 months ago
Privacy technologies

This tiny Chrome extension fights fingerprinting without breaking sites

#nodejs
Node JS
fromZero Day Initiative
1 week ago

Zero Day Initiative - Node.js Trust Falls: Dangerous Module Resolution on Windows

Node.js module resolution can lead to security vulnerabilities if malicious packages are placed in the root node_modules directory.
Node JS
fromThe Cyber Express
3 weeks ago

Node.js Fixes CVE-2026-21637 And Critical Flaws Now

Node.js has released security updates addressing multiple vulnerabilities, including critical issues in TLS error handling and HTTP request processing.
React
fromInfoWorld
2 weeks ago

Local-first browser data gets real

Signals provide a performant alternative for reactive state management in front-end development.
#microsoft
Information security
fromSecurityWeek
4 days ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
Privacy technologies
fromThe Verge
4 days ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
Information security
fromThe Hacker News
4 days ago

Microsoft Issues Patches for SharePoint Zero-Day and 168 Other Vulnerabilities

Microsoft addressed 169 security flaws, including one actively exploited vulnerability, marking the second largest Patch Tuesday ever.
Information security
fromSecurityWeek
4 days ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
#cisco
Information security
fromThe Hacker News
3 days ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
3 days ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
3 days ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
3 days ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromSecurityWeek
4 days ago

100 Chrome Extensions Steal User Data, Create Backdoor

Over 20,000 users installed malicious Chrome extensions that steal information, provide backdoors, or inject ads, as reported by cybersecurity firm Socket.
#npm
Node JS
fromInfoQ
2 weeks ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
2 weeks ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
2 weeks ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Node JS
fromInfoQ
2 weeks ago

Axios npm Package Compromised in Supply Chain Attack

A significant supply chain attack on Axios introduced a Remote Access Trojan via hijacked maintainer accounts, affecting numerous developer environments.
Node JS
fromBleepingComputer
2 weeks ago

Hackers compromise Axios npm package to drop cross-platform malware

Hackers compromised the Axios npm account to distribute remote access trojans across multiple operating systems.
Node JS
fromTheregister
2 weeks ago

Top npm package backdoored to drop dirty RAT on dev machines

A widely used npm library, axios, was compromised to deliver malware through a maintainer's hijacked account.
Information security
fromTechzine Global
3 days ago

AI agents on GitHub leak API keys via prompt injection

Three popular AI agents on GitHub Actions are vulnerable to Comment and Control attacks, allowing attackers to steal API keys and access tokens.
Privacy technologies
fromThe Hacker News
1 week ago

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google's Device Bound Session Credentials enhance security for Chrome users by tying authentication sessions to specific devices, combating session theft.
#axios
Information security
fromBleepingComputer
2 weeks ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
fromSiliconANGLE
2 weeks ago
Information security

Hackers compromise popular Axios Javascript library with hidden malware - SiliconANGLE

Axios HTTP client library was hacked to distribute malware via a compromised npm account, affecting multiple operating systems.
Node JS
fromSecurityWeek
2 weeks ago

Axios NPM Package Breached in North Korean Supply Chain Attack

Malicious Axios NPM library versions were distributed in a supply chain attack by North Korean hackers, affecting millions of users.
Node JS
fromThe Hacker News
2 weeks ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Axios experienced a supply chain attack due to malicious dependencies in two npm package versions.
Information security
fromBleepingComputer
2 weeks ago

Axios npm hack used fake Teams error fix to hijack maintainer account

A social engineering attack linked to North Korean hackers compromised Axios maintainers, leading to a supply chain attack with malicious npm package versions.
Information security
fromSiliconANGLE
2 weeks ago

Hackers compromise popular Axios Javascript library with hidden malware - SiliconANGLE

Axios HTTP client library was hacked to distribute malware via a compromised npm account, affecting multiple operating systems.
Web development
fromMozilla Hacks - the Web developer blog
1 month ago

Goodbye innerHTML, Hello setHTML: Stronger XSS Protection in Firefox 148 - Mozilla Hacks - the Web developer blog

Firefox 148 introduces the standardized Sanitizer API, enabling developers to safely remove malicious HTML and JavaScript from user-generated content before inserting it into the DOM.
Information security
fromTechzine Global
5 days ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
fromYcombinator
5 days ago
Information security

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

An open-source AI agent was developed with a secure, sandboxed architecture to prevent data exfiltration and unauthorized actions.
Information security
fromTechzine Global
5 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Web development
fromComputerworld
1 month ago

Anthropic's Claude found 22 vulnerabilities in Firefox in two weeks

Anthropic and Mozilla's AI-powered security testing identified 22 Firefox vulnerabilities, including 14 serious flaws, using Claude Opus 4.6 across nearly 6,000 C files.
Software development
fromTechCrunch
1 month ago

Anthropic's Claude found 22 vulnerabilities in Firefox over two weeks | TechCrunch

Anthropic discovered 22 vulnerabilities in Firefox using Claude Opus 4.6, with 14 classified as high-severity, most fixed in Firefox 148.
#chrome
Information security
fromTechRepublic
2 weeks ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
fromDataBreaches.Net
1 month ago
Information security

Update Chrome now: Zero-day bug allows code execution via malicious webpages - DataBreaches.Net

Update Chrome to 145.0.7632.75 or later to patch a high‑severity font-handling memory zero-day (CVE‑2026‑2441) that is being exploited in the wild.
fromTechzine Global
2 months ago
Information security

Google patches first Chrome zero-day of 2026

High-severity use-after-free in Chrome's V8 CSSFontFeatureValuesMap permits crashes and data corruption; patches were issued but related issues may still require fixes.
Information security
fromTechRepublic
2 weeks ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
Gadgets
fromFast Company
2 months ago

Firefox just made an unexpected move that Chrome would never copy

Firefox adds a single settings toggle to block current and future generative AI features across the desktop browser.
fromThe Hacker News
2 weeks ago

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation - Patch Released

"Use-after-free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page."
Information security
fromSecurityWeek
3 weeks ago

Chrome 146 Update Patches High-Severity Vulnerabilities

The first vulnerability, CVE-2026-4673, is a heap buffer overflow issue in WebAudio that earned the reporting researcher a $7,000 bug bounty reward. Google has yet to determine the bounty amount for CVE-2026-4677, another bug reported by the same researcher.
Information security
fromComputerworld
3 weeks ago

Chrome encryption bypass discovered: New malware steals passwords and cookies

The bypass requires neither privilege escalation nor code injection, making it a stealthier approach compared to alternative ABE bypass methods.
Information security
Node JS
fromInfoWorld
1 month ago

Why local-first matters for JavaScript

JavaScript innovation accelerates through local-first SQL datastores, universal isomorphic JavaScript via WinterTC, reactive signals adoption, NPM alternatives, Java-JavaScript bridges, and Deno's resurgence.
fromThe Hacker News
1 month ago

Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), has been described as a cross-origin issue in WebKit's Navigation API that could be exploited to bypass the same-origin policy when processing maliciously crafted web content.
Information security
Information security
fromComputerWeekly.com
1 month ago

Apple issues first Background patch for WebKit browser flaw | Computer Weekly

Apple released a security update addressing CVE-2026-20643, a WebKit vulnerability allowing attackers to bypass the Same Origin Policy and access data from other websites through maliciously crafted web content.
#privacy
fromZDNET
2 months ago
Privacy technologies

How to strip AI from Chrome, Edge, and Firefox with one simple script

fromZDNET
2 months ago
Privacy technologies

How to strip AI from Chrome, Edge, and Firefox with one simple script

#chrome-zero-day-vulnerabilities
Information security
fromThe Hacker News
1 month ago

Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More

Active Chrome zero-day exploits, Instagram E2EE discontinuation, and SocksEscort proxy service disruption highlight escalating security threats and privacy rollbacks across major platforms.
fromTechRepublic
1 month ago
Information security

Critical Chrome Security Flaws Threaten Billions of Users Worldwide

Google patched two actively exploited zero-day vulnerabilities in Chrome affecting billions of users worldwide, with flaws in graphics rendering and JavaScript execution components.
Information security
fromThe Hacker News
1 month ago

Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More

Active Chrome zero-day exploits, Instagram E2EE discontinuation, and SocksEscort proxy service disruption highlight escalating security threats and privacy rollbacks across major platforms.
Information security
fromTechRepublic
1 month ago

Critical Chrome Security Flaws Threaten Billions of Users Worldwide

Google patched two actively exploited zero-day vulnerabilities in Chrome affecting billions of users worldwide, with flaws in graphics rendering and JavaScript execution components.
Node JS
fromDevOps.com
1 month ago

Malicious NPM Package Gets Downloaded 50K Times Before Discovery - DevOps.com

A malicious npm package downloaded 50,000 times used naming deception and preinstall script hooks to evade detection and compromise Windows, Linux, and macOS systems.
fromZDNET
2 months ago

I used one simple script to remove AI from popular browsers (including Chrome and Firefox)

I do not want AI in my web browser. I just don't. I also don't want companies collecting information about me, or sponsored content and product integrations. All those bits make me want to pull my hair out. I like my privacy and want to browse, you know, the old-fashioned way. I do use AI (on occasion), but only locally-installed AI and only for specific purposes (such as learning Python or researching a topic when I don't want to use a standard search engine).
Privacy technologies
#browser-security
Information security
fromComputerworld
1 month ago

Google warns of two actively exploited Chrome zero days

Critical Chromium browser vulnerabilities with active exploitation require immediate updates across all Chromium-based browsers to prevent drive-by attacks.
fromZDNET
1 month ago
Information security

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

Information security
fromComputerworld
1 month ago

Google warns of two actively exploited Chrome zero days

Critical Chromium browser vulnerabilities with active exploitation require immediate updates across all Chromium-based browsers to prevent drive-by attacks.
fromZDNET
1 month ago
Information security

Half of all cyberattacks start in your browser: 10 essential tips for staying safe

fromTheregister
1 month ago

Google rushes Chrome update to fix zero-days under attack

CVE-2026-3909 is an out-of-bounds write flaw in Skia, the graphics library Chrome uses to render web content and parts of its user interface. Memory corruption bugs like this can sometimes be abused by attackers to crash applications or run their own code if successfully exploited.
Information security
Information security
fromSecurityWeek
1 month ago

Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea

The 2024 Polyfill.io supply chain attack affecting over 100,000 websites involved both Chinese and North Korean threat actors, with Funnull serving as a corporate front for the operation.
Information security
fromThe Hacker News
1 month ago

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Two Chrome extensions were compromised through ownership transfers, enabling attackers to inject malware, execute arbitrary code, and steal user data from thousands of users.
Information security
fromThe Hacker News
1 month ago

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Anthropic's Claude AI discovered 22 Firefox vulnerabilities including 14 high-severity issues, demonstrating AI's capability in security research while showing limitations in exploit development.
Information security
fromTechRepublic
1 month ago

Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files

A security vulnerability in Perplexity's Comet browser allowed attackers to access local files through hidden instructions in routine content like calendar invitations, exposing risks in AI browser agents that autonomously execute actions while authenticated.
Information security
fromInfoWorld
1 month ago

Angular releases patches for SSR security issues

Google's Angular team released two security updates for SSR vulnerabilities: a critical SSRF/header injection flaw and a moderate open redirect flaw, requiring immediate patching to prevent authorization header theft and phishing attacks.
#chrome-security-vulnerability
Information security
fromZDNET
1 month ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromTheregister
1 month ago

Chrome AI panel became privilege escalator for extensions

A high-severity Chrome vulnerability allowed malicious extensions to hijack the Gemini Live AI panel and gain unauthorized access to system resources like cameras, microphones, and local files.
Information security
fromThe Hacker News
1 month ago

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

A patched Chrome vulnerability (CVE-2026-0628) allowed malicious extensions to escalate privileges and access local files, camera, microphone, and screenshots through insufficient WebView policy enforcement.
Information security
fromZDNET
1 month ago

This high-severity Chrome Gemini vulnerability lets malicious extensions spy on your PC

A high-severity vulnerability in Chrome's Gemini feature allows malicious extensions to inject code, enabling attackers to spy on users, steal data, access webcams and microphones, and conduct phishing attacks.
Information security
fromTechRepublic
7 months ago

This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data

AI-enabled browsers that combine web access, account access, and external communication can be exploited to steal accounts via hidden instructions in webpages.
#chrome-extensions
fromSecurityWeek
2 months ago

Chrome, Edge Extensions Caught Stealing ChatGPT Sessions

The tools were designed to intercept users' ChatGPT session authentication tokens and send them to a remote server, but they don't exploit ChatGPT vulnerabilities to do so. Instead, they inject a content script into chatgpt.com and execute it in the MAIN JavaScript world. The script monitors outbound requests initialized by the web application, to identify and extract authorization headers and send them to a second content script, which exfiltrates them to the remote server.
Information security
fromCSS-Tricks
1 month ago

An Exploit ... in CSS?! | CSS-Tricks

Google credits security researcher Shaheen Fazim with reporting the exploit to Google. The dude's LinkedIn says he's a professional bug hunter, and I'd say he deserves the highest possible bug bounty for finding something that a government agency is saying "in CSS in Google Chrome before 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page."
Information security
fromThe Hacker News
1 month ago

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

"The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting," the company said. The packages, published to npm by two npm publisher aliases, official334 and javaorg, are listed below - Also identified are four sleeper packages that do not incorporate any malicious features -
Information security
Information security
fromThe Hacker News
2 months ago

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

CL Suite Chrome extension exfiltrates Meta Business Suite and Facebook Business Manager TOTP seeds, 2FA codes, contact lists, and analytics to attacker-controlled servers.
fromSecurityWeek
2 months ago

Chrome 145 Patches 11 Vulnerabilities

Google on Tuesday announced the release of Chrome 145 to the stable channel with fixes for 11 vulnerabilities, including three high-severity bugs. First in line is CVE-2026-2313, a high-severity use-after-free issue in CSS that earned the reporting researchers an $8,000 bug bounty reward. The two other high-severity defects, tracked as CVE-2026-2314 and CVE-2026-2315, were found and reported by Google and are described as a heap buffer overflow in Codecs and an inappropriate implementation in WebGPU, respectively.
Information security
fromComputerworld
2 months ago

Exploit available for new Chrome zero-day vulnerability, says Google

Gene Moody, field CTO at Action1, explained that, in this vulnerability, a browser frees an object, but later continues to use the stale reference memory location. Any attacker who can shape heap layout with controlled content can potentially replace the contents of that freed memory with data they control. Because this lives in the renderer, and is reachable through normal page content, he said, the trigger surface is almost absolute.
Information security
Information security
fromThe Hacker News
2 months ago

Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More

Incomplete patches and trusted features enable attackers to bypass defenses, making fully patched systems and common tools frequent entry points.
Information security
fromThe Hacker News
2 months ago

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Malicious Chrome extensions hijack affiliate links, steal user data, and collect OpenAI ChatGPT authentication tokens across a 29-extension e-commerce-targeting cluster.
fromInfoWorld
1 month ago

Compromised npm package silently installs OpenClaw on developer machines

Researchers have discovered that a compromised npm publish token pushed an update for the widely-used Cline command line interface (CLI) containing a malicious postinstall script. That script installs the wildly popular, but increasingly condemned, agentic application OpenClaw on the unsuspecting user's machine. This can be extremely dangerous, as OpenClaw has broad system access and deep integrations with messaging platforms including WhatsApp, Telegram, Slack, Discord, iMessage, Teams, and others.
Information security
[ Load more ]