Modern digital workflows have become increasingly dependent on browser extensions, supporting a variety of tasks ranging from grammar correction, password management, and advanced AI integrations into everyday tasks. Browser extensions have become widely used across both personal and corporate…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Malicious Chrome Extensions Spoof Password Managers in Novel Polymorphic Attack
Cybersecurity experts have uncovered a novel technique for a malicious web browser extension to spoof any installed add-on. “The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate…
Lostkeys Malware: Russian Group Coldriver Targets Western Officials in Espionage Campaign
A new wave of cyber espionage has emerged, with Russian hackers deploying a sophisticated malware strain known as “Lostkeys” to infiltrate the systems of Western officials, journalists, and NGOs. According to researchers from Google’s Threat Intelligence Group, the malware…
Bangladesh’s Deepfake Challenge: Why New Laws Aren’t Enough
Bangladesh has taken a big step to protect its people online by introducing the Cyber Security Ordinance 2025. This law updates the country’s approach to digital threats, replacing the older and often criticized 2023 act. One of its most…
New AI Video Tool Scam Delivers Noodlophile Malware to Steal Your Data
Cybercriminals are using fake AI-powered video generation tools to spread a newly discovered malware strain called ‘Noodlophile’, disguised as downloadable media content. Fraudulent websites with names like “Dream Machine” are being promoted in high-visibility Facebook groups, pretending to be…
Safeguarding Personal Privacy in the Age of AI Image Generators
A growing trend of artificial intelligence-powered image creation tools has revolutionised the way users interact with digital creativity, providing visually captivating transformations in just a matter of clicks. The ChatGPT and Grok 3 platforms, which use artificial intelligence, offer…
Understanding Cybersquatting: How Malicious Domains Threaten Brands and Individuals
Cybersquatting remains a persistent threat in the digital landscape, targeting businesses, individuals, and public figures alike. This deceptive practice involves registering domain names that closely resemble those of legitimate brands or individuals, often with malicious intent. Despite rising awareness…
Here’s Why Websites Are Offering “Ad-Lite” Premium Subscriptions
Some websites allow you to totally remove adverts after subscribing, while others now offer “ad-lite” memberships. However, when you subscribe to ad-supported streaming services, you do not get the best value. Not removing all ads Ads are a significant…
Employee Monitoring Tool Kickidler Targeted in Ransomware Attacks
Cybersecurity researchers have discovered that cybercriminals are misusing a legitimate employee monitoring tool called Kickidler to execute targeted ransomware attacks. Originally developed to help businesses track productivity and ensure compliance, Kickidler offers features like real-time screen monitoring, keystroke logging,…
Cybercriminals Employ Display Fake Login Pages in Your Browser
Cofense Intelligence cybersecurity researchers have discovered a new and increasingly successful technique that attackers are using to deliver credential phishing pages straight to users’ email inboxes. This technique, which first surfaced in mid-2022, makes use of “blob URIs” (binary…