Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers

Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars

Fake web stores are fraudulent websites created by threat actors to mislead consumers into providing "personal information" and making purchases for "non-existent products." These sites often mimic the appearance of legitimate retailers, making them...
Vulnerabilities WebRTC Implementations

Vulnerabilities In WebRTC Implementations Let Attackers Trigger DoS Attacks

WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers and mobile applications without the need for plugins. Its integration into HTML5 and support across...
Researcher Exploited CI / CD Pipelines To Gain Full Server Access

Researcher Exploited CI / CD Pipelines To Gain Full Server Access

A CI/CD pipeline is a series of automated steps that helps software teams deliver code faster, safer, and more reliably.  It coordinates all the processes involved in continuous integration (CI) and continuous delivery (CD). The...
Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

Malicious Chrome extensions pose significant risks to users, as they can compromise personal information, inject unwanted promotions, and even manipulate web traffic as well. There are several malicious extensions that remain undetected for extended periods,...
Understanding The Different Types Of SSL Certificates

Understanding The Different Types Of SSL Certificates

As of January 2024, over 302 million SSL certificates had been issued online. Secure Sockets Layer (SSL) is a security protocol which authenticates and encrypts information passed between web servers and browsers. An SSL...
Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks

Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks

Okta Browser Plugin is available on multiple browsers like Edge, Chrome, Safari, and Firefox. Combining all these browsers, the plugin has over 5 million users. However, this plugin was discovered to have a Cross-site Scripting...
Hackers Abuse Swap File In Shopping Sites To Inject Persistent Credit Card Skimmer

Hackers Abuse Swap File In Shopping Sites To Inject Credit Card Skimmer

Since the Swap file stores data that the system's RAM cannot hold, these contents often contain critical data like passwords, encryption keys, and session data, due to which hackers often target Swap files. So, hackers...
New Skimmer Malware Attacking E-commerce WebSites To Steal Credit Card Data

New Skimmer Malware Attacking E-commerce WebSites To Steal Credit Card Data

Researchers identified a new variant of credit card skimming attack, the Caesar Cipher Skimmer, targeting multiple content management systems (CMS), including WordPress, Magento, and OpenCart.  The skimmer specifically targets the checkout process, injecting malicious code...
3 Security Trends for MSP’s: Must-Watch Free Webinar to Help MSPs Win Big

3 Security Trends for MSP’s: Must-Watch Free Webinar to Help MSPs Win Big

MSP leaders are advised to save the date for June 27. In a special session, called “3 Security Trends to Maximize MSP Growth” and hosted by Cynet, deeply experienced security experts will unpack insights...
Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution

Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution

Hackers use JavaScript frameworks since they offer a wide range of functionalities and tools that could be used to bypass detection, hide code, and carry out harmful acts. In addition, they take advantage of the...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...