SIEM as a Service
Home Search

Browser - search results

If you're not happy with the results, please do another search
HTTP Range Header

Researchers Exploit Reflected Input with HTTP Range Header To Bypass Browser Restriction

Security researchers have uncovered a technique that takes previously unexploitable reflected input vulnerabilities and turns them into fully functional attacks through clever use of...
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isolation technologies, a widely used security measure designed to protect users from web-based...
Celestial Stealer Attacking Browsers

Sophisticated Celestial Stealer Attacking Browsers to Steal Login Credentials

Celestial Stealer, a JavaScript-based infostealer packaged either as an Electron application, has been spotted targeting both Chromium and Gecko-based browsers to steal browser data. The...
SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024

SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024

SquareX, the leading browser security company, will make its Australian debut at Melbourne CyberCon 2024, hosted by AISA (Australian Information Security Association), from 26th...
New Glove Stealer Bypass App-Bound Encryption To Steal Data From Browsers

New Glove Stealer Bypass App-Bound Encryption To Steal Data From Browsers

Stealers are designed to be stealthy primarily to avoid detection by AV tools and to remain hidden from the user. Combination of multiple sophisticated tactics...
Opera Browser 0-Day Flaw

Opera Browser 0-Day Flaw Allows Malicious Extensions to Takeover Browser

A critical vulnerability in the Opera web browser has been discovered that could allow malicious extensions to gain unauthorized access to private APIs, potentially...
Tor Browser 14.0 Released

Tor Browser 14.0 Released: What’s New?

The Tor Project has announced the release of Tor Browser 14.0, marking a significant update to this privacy-focused web browser. This release is based on...
PureLogs Chrome Browser

PureLogs, Low Cost Infostealer Attacking Chrome Browser

The world of cyber threats is intricate and ever-changing. Threat actors are always improving their methods, and new strains of infostealer malware frequently surface. Infostealers...
A Step-by-Step Guide to Installing a YouTube Ad Blocker on Any Browser

A Step-by-Step Guide to Installing a YouTube Ad Blocker on Any Browser

Tired of constant interruptions while streaming videos? Using a adblock Chrome extension or similar tool can help you enjoy an ad-free experience on YouTube....
Arc Browser Announces Bug Bounty Program Following RCE Vulnerability

Arc Browser Announces Bug Bounty Program Following RCE Vulnerability

The Browser Company has launched a Bug Bounty Program for its Arc Browser following the discovery and swift resolution of a remote code execution...
SIEM as a Service

Recent Posts