Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
Millions installed 'productivity' Chrome extensions that became malware after acquisition. Here's how browser extensions became enterprise security's weakest link.
IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that ...
The Document Foundation (TDF) has pulled LibreOffice Online out of its "attic" – its term for retired projects – and is ...
North Korean-linked campaign publishes 26 malicious npm packages hiding C2 in Pastebin, deploying credential stealers & RAT ...
The Windows Store currently showcases the first version of the app, but once you download it, you will have the first version of the app with an update available. Install that update to have v2. We ...
A Chrome extension named "QuickLens - Search Screen with Google Lens" has been removed from the Chrome Web Store after it was ...
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Wix may be the biggest name in website building, but is it right for you? Our Wix review helps you get all the information you need to make an informed decision. We’ve extensively tried and tested 80+ ...