
Cybersecurity

16 Chrome Extensions Hacked in Large-Scale Credential Theft Scheme
SUMMARY Large-Scale Breach: Over 16 Chrome extensions were compromised, exposing 600,000+ users to data and credential theft. Phishing Attack: Developers were tricked into granting access to a malicious OAuth app via fake Chrome Web Store emails. Cyberhaven Impact: Attackers used admin credentials to deploy a malicious update stealing sensitive user data. Widespread Impact: Many extensions…

Prioritizing patching: A deep dive into frameworks and tools – Part 2: Alternative frameworks
In the first part of this series, we took a close look at CVSS and how it works, concluding that while CVSS may offer some benefits, it’s not designed to be used as a sole means of prioritization. In this article, we’ll cover some alternative tools and systems for remediation prioritization, how they can be…

Cybersecurity Lags in Middle East Business Development
COMMENTARY The Middle East is undergoing a digital transformation that is as rapid as it is remarkable. Tech multinationals are investing big in the region as Dubai, Riyadh, and Abu Dhabi strive to establish themselves as global innovation hubs. But this increased digitization comes with an increased risk of cyberattacks — and businesses throughout the…

Scams to look out for this holiday season
As the mercury starts to dip and the Halloween decorations are cleared away, it can mean only one thing: the countdown to Christmas has begun. But the festive season – or Golden Quarter if you’re a retailer – is not just a boon for online stores. It’s also a time of plenty for digital thieves…

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
Dec 30, 2025Ravie LakshmananCybersecurity / Hacking News Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it’s a hidden flaw in popular software or a clever new attack method, staying informed is key to protecting…

Happy 15th Anniversary, KrebsOnSecurity! – Krebs on Security
Image: Shutterstock, Dreamansions. KrebsOnSecurity.com turns 15 years old today! Maybe it’s indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024’s most engrossing security stories were about bad things happening to bad guys. It’s also an occasion to note that despite my publishing fewer stories than…

What is a Proxy Firewall? | Definition from TechTarget
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. It is also called an application firewall or gateway firewall and is the most secure type of firewall. How does a proxy firewall work? A proxy firewall stands between an internal network and the public-facing internet….

Cybercrime Threats: Top 10 Countries Targeted In 2024
Overview Cyberattacks on a country’s critical infrastructure have become a growing malicious trend globally. The surge in cybercrime threats and its growing impact on national security, businesses, and individuals has led experts to closely examine which regions face the most cyberattacks. A recent study from the World Cybercrime Index (WCI) compiled by an international team…

SEO Poisoning: How Scammers Turn Search Engines into Traps
Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams. Learn risks, real-world examples, and preventive measures for safer browsing. Did you know that over 80% (PDF) of cyberattacks exploit online platforms, including search engines? These indispensable tools guide billions of users to the content they seek,…

Law enforcement agencies see AI as a key tool for reducing crime – Help Net Security
A U.S. national survey of first responders reveals strong support for AI adoption, cybersecurity concerns, and increasing demand for cloud-native, data-driven, and interoperable CAD and RMS systems to improve efficiency and public safety outcomes, according to Mark43. “Public safety agencies across the United States are grappling with challenges such as cyberattacks, legacy system outages, and…