Home

Over 37 Million Users Targeted by 287 Malicious Chrome Extensions

A recent investigation uncovered 287 Chrome extensions that may be quietly collecting users’ browsing data and transmitting it to external servers. These extensions represent around 37.4 million installs — close [...]

Threat Actors Leverage ChatGPT, Grok, and Google Ads to Deploy macOS AMOS Stealer

Threat actors are evolving — and they’re doing it on trusted platforms. A recent campaign shows attackers abusing shareable ChatGPT and Grok conversations, then promoting those links through Google Search [...]

Microsoft 365 Admin Center Disruption Affects North American Users

Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center, creating operational challenges for organizations that depend on the platform for daily management [...]

Malicious 7-Zip Files Converting PCs into Proxy Nodes

Cybercriminals are running a sneaky operation that uses a fake version of the popular 7-Zip archiving tool to compromise everyday home computers. Instead of just installing file compression software, victims [...]

FortiOS Authentication Flaw Enables LDAP Bypass

A new security advisory from Fortinet highlights a serious weakness in FortiOS that could let attackers slip past authentication controls in certain environments. The issue, tracked as CVE-2026-22153, affects how [...]

By | February 10th, 2026|Cybersecurity, Secuirty Update, Security Advisory, vulnerability|0 Comments

Subscribe to our newsletter to receive security tips everday!