fromThe Hacker News2 months agoMarketing techMalicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025
Privacy technologiesfromThe Hacker News2 months ago100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting AdsMalicious Chrome extensions disguise as useful tools, siphoning user data and executing harmful actions.Threat actor uses impersonation tactics to lure victims into installing malware on Chrome.
fromThe Hacker News2 months agoGrowth hackingMalicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts
fromThe Hacker News2 months agoMarketing techMalicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025
Privacy technologiesfromThe Hacker News2 months ago100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting AdsMalicious Chrome extensions disguise as useful tools, siphoning user data and executing harmful actions.Threat actor uses impersonation tactics to lure victims into installing malware on Chrome.
fromThe Hacker News2 months agoGrowth hackingMalicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts
fromForbes3 months agoDelete Any Apps On Your Phone That Are On This ListThe attackers' payday comes via those advertisers who have no idea their ads are being pushed out at an industrial scale to infected phones.Games
Software developmentfromInfoQ3 months agoGoogle Go Module Mirror Served Backdoor for 3+ YearsResearch uncovered a major supply chain attack in the Go ecosystem involving a backdoored package.The attack exploited caching in the Go Module Proxy, emphasizing security vulnerabilities in module management.
Artificial intelligencefromTechRepublic4 months agoDevelopers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered AttacksSlopsquatting is a dangerous supply chain attack that exploits AI's tendency to create fictitious software packages.