Home Search
Browser - search results
If you're not happy with the results, please do another search
Researchers Exploit Reflected Input with HTTP Range Header To Bypass Browser Restriction
Security researchers have uncovered a technique that takes previously unexploitable reflected input vulnerabilities and turns them into fully functional attacks through clever use of...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based...
Sophisticated Celestial Stealer Attacking Browsers to Steal Login Credentials
Celestial Stealer, a JavaScript-based infostealer packaged either as an Electron application, has been spotted targeting both Chromium and Gecko-based browsers to steal browser data.
The...
SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024
SquareX, the leading browser security company, will make its Australian debut at Melbourne CyberCon 2024, hosted by AISA (Australian Information Security Association), from 26th...
New Glove Stealer Bypass App-Bound Encryption To Steal Data From Browsers
Stealers are designed to be stealthy primarily to avoid detection by AV tools and to remain hidden from the user.
Combination of multiple sophisticated tactics...
Opera Browser 0-Day Flaw Allows Malicious Extensions to Takeover Browser
A critical vulnerability in the Opera web browser has been discovered that could allow malicious extensions to gain unauthorized access to private APIs, potentially...
Tor Browser 14.0 Released: What’s New?
The Tor Project has announced the release of Tor Browser 14.0, marking a significant update to this privacy-focused web browser.
This release is based on...
PureLogs, Low Cost Infostealer Attacking Chrome Browser
The world of cyber threats is intricate and ever-changing. Threat actors are always improving their methods, and new strains of infostealer malware frequently surface.
Infostealers...
A Step-by-Step Guide to Installing a YouTube Ad Blocker on Any Browser
Tired of constant interruptions while streaming videos? Using a adblock Chrome extension or similar tool can help you enjoy an ad-free experience on YouTube....
Arc Browser Announces Bug Bounty Program Following RCE Vulnerability
The Browser Company has launched a Bug Bounty Program for its Arc Browser following the discovery and swift resolution of a remote code execution...