IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel
EN, www.infosecurity-magazine.com

Legitimate Chrome VPN Extension Turns to Browser Spyware

2025-08-19 14:08

Researchers detected that FreeVPN.One, a longstanding Chrome Web Store VPN extension, recently turned into spyware

This article has been indexed from www.infosecurity-magazine.com

Read the original article:

Legitimate Chrome VPN Extension Turns to Browser Spyware

Tags: EN www.infosecurity-magazine.com

Post navigation

← North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Apps
    • Telegram Channel

Recent Posts

  • The Importance of Customer Empathy and Direction in the Cybersecurity Industry August 19, 2025
  • Citizen Lab Reports Hidden VPN Networks Sharing Ownership and Security Flaws August 19, 2025
  • 5 ways automation can speed up your daily workflow – and implementation is easy August 19, 2025
  • Webinar: Why AI and SaaS are now the same attack surface August 19, 2025
  • Allianz Life Data Breach Exposes Personal Data of 1.1 Million Customers August 19, 2025
  • How to clear your iPhone cache (and why you should do it before the iOS 26 update) August 19, 2025
  • Should you buy a refurbished iPad in 2025? I did the math so you don’t have to August 19, 2025
  • Changing these 10 settings on my Pixel phone greatly improved the user experience August 19, 2025
  • This $200 Android phone with a paper-like display made my Pixel look overbearing August 19, 2025
  • This new Coros watch has 3 weeks of battery life and tracks way more – even fly fishing August 19, 2025
  • 493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds August 19, 2025
  • US spy chief says UK has dropped its Apple backdoor demand August 19, 2025
  • Lockbit Linux ESXi Ransomware Variant Evasion Techniques, File Encryption Process Uncovered August 19, 2025
  • PyPI to Block Domains Resurrection Attacks by Blocking Access to 1800 Expired Domains August 19, 2025
  • New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers August 19, 2025
  • LostMyPassword – Dual Use Password Recovery and Credential Dumping Tool August 19, 2025
  • Android VPN apps used by millions are covertly connected AND insecure August 19, 2025
  • Cofense Vision 3.0 identifies user engagement with phishing emails August 19, 2025
  • IT Security News Hourly Summary 2025-08-19 15h : 21 posts August 19, 2025
  • Microsoft Dissects PipeMagic Modular Backdoor August 19, 2025

Copyright © 2025 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}