UID smuggling: A new technique for tracking users online

Advertisers and web trackers have been able to aggregate users’ information across all of the websites they visit for decades, primarily by placing third-party cookies in users’ browsers. Two years ago, several browsers that prioritize user privacy beg… Continue reading UID smuggling: A new technique for tracking users online

Threat actors extend attack techniques to new enterprise apps and services

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of security and IT decision-makers at large enterprises and reveals numerous si… Continue reading Threat actors extend attack techniques to new enterprise apps and services

Chrome Extensions Harboring Dormant Colors Malware Infect Over a Million PCs

By Waqas
Among other capabilities, Dormant Colors malware can also inject ads into standard pages and append affiliate links to e-commerce websites to generate affiliate revenue.
This is a post from HackRead.com Read the original post: Chrome Extension… Continue reading Chrome Extensions Harboring Dormant Colors Malware Infect Over a Million PCs

OnionPoison – Fake Tor Browser Installer Spreading Malware Via YouTube

By Waqas
Threat actors are using YouTube’s video description feature to spread the fake Tor browser through a malicious website.
This is a post from HackRead.com Read the original post: OnionPoison – Fake Tor Browser Installer Spreading Malware V… Continue reading OnionPoison – Fake Tor Browser Installer Spreading Malware Via YouTube

Meet Plexus, An AI-based Browser Security Solution from LayerX

By Waqas
With the increasing use of the internet, browser security has become an important issue. Malware, phishing, and adware…
This is a post from HackRead.com Read the original post: Meet Plexus, An AI-based Browser Security Solution from LayerX
Continue reading Meet Plexus, An AI-based Browser Security Solution from LayerX

Threat in your browser: what dangers innocent-looking extensions hold for users

In this research, we observed various types of threats that mimic useful web browser extensions, and the number of users attacked by them. Continue reading Threat in your browser: what dangers innocent-looking extensions hold for users

Browser synchronization abuse: Bookmarks as a covert data exfiltration channel

Two universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make users’ lives easier, but may also allow hackers to establish a covert data exfil… Continue reading Browser synchronization abuse: Bookmarks as a covert data exfiltration channel

Researchers Warn of New Variants of ChromeLoader Browser in the Wild

By Deeba Ahmed
ChromeLoader malware is spread through pirated games, malicious QR codes, and cracked software that hijacks the victim’s web…
This is a post from HackRead.com Read the original post: Researchers Warn of New Variants of Chrome… Continue reading Researchers Warn of New Variants of ChromeLoader Browser in the Wild