#browser-extension-compromise

[ follow ]
Information security
fromThe Hacker News
1 week ago

Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Steady, quiet exploitation of trusted mechanisms—updates, extensions, logins, and messages—drives long-lived attacks like RondoDox and supply-chain compromises.
Information security
fromThe Hacker News
2 weeks ago

Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Attackers exploited trusted tools and resurfaced flaws in 2025, moving faster than remediation and causing long-lasting, widespread impacts.
[ Load more ]