Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars
Fake web stores are fraudulent websites created by threat actors to mislead consumers into providing "personal information" and making purchases for "non-existent products." These...
Vulnerabilities In WebRTC Implementations Let Attackers Trigger DoS Attacks
WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers and mobile applications without...
Researcher Exploited CI / CD Pipelines To Gain Full Server Access
A CI/CD pipeline is a series of automated steps that helps software teams deliver code faster, safer, and more reliably.
It coordinates all the processes...
Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive
Malicious Chrome extensions pose significant risks to users, as they can compromise personal information, inject unwanted promotions, and even manipulate web traffic as well.
There...
Understanding The Different Types Of SSL Certificates
As of January 2024, over 302 million SSL certificates had been issued online. Secure Sockets Layer (SSL) is a security protocol which authenticates and...
Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks
Okta Browser Plugin is available on multiple browsers like Edge, Chrome, Safari, and Firefox. Combining all these browsers, the plugin has over 5 million...
Hackers Abuse Swap File In Shopping Sites To Inject Credit Card Skimmer
Since the Swap file stores data that the system's RAM cannot hold, these contents often contain critical data like passwords, encryption keys, and session...
New Skimmer Malware Attacking E-commerce WebSites To Steal Credit Card Data
Researchers identified a new variant of credit card skimming attack, the Caesar Cipher Skimmer, targeting multiple content management systems (CMS), including WordPress, Magento, and...
3 Security Trends for MSP’s: Must-Watch Free Webinar to Help MSPs Win Big
MSP leaders are advised to save the date for June 27. In a special session, called “3 Security Trends to Maximize MSP Growth” and...
Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution
Hackers use JavaScript frameworks since they offer a wide range of functionalities and tools that could be used to bypass detection, hide code, and...