ShadyPanda Weaponizes Trusted Browser Extensions in 7-Year Campaign
A seven-year malware campaign turned trusted browser extensions into spyware, affecting 4.3 million. WeTab and other extensions remain active in Edge's store.
A seven-year malware campaign turned trusted browser extensions into spyware, affecting 4.3 million. WeTab and other extensions remain active in Edge's store.
Hotels worldwide face PureRAT infections via fake Booking.com emails. The result is stolen credentials and scams against real guests.
A malware infection led to stolen Slack credentials at Nikkei, exposing 17,368 users. The breach underscores growing credential theft threats in 2025.
TA585 launches MonsterV2 malware, capable of live transaction tampering via browser injection. Just-in-time privilege controls help limit damage.
Zero-day exploits hit before defenders even know what to look for. See why managing user privileges is your best chance to limit real-world damage.
Dior joins a wave of retail brands hit by cyberattacks. While financial data was safe, exposed shopping histories raise major phishing risks.
Learn how an advanced persistent threat (APT) works, why it's so dangerous to organizations, and what steps can help detect and respond before damage is done.
Spot these social engineering indicators before you get tricked. Discover 10 red flags attackers use to manipulate your actions and access sensitive data.
Minimize risk and boost productivity through the Principle of Least Privilege. Learn how to protect your organization without slowing users down.
Enhance security and streamline IT with Endpoint Privilege Management (EPM). Reduce risks, ensure compliance, and optimize operations with least-privilege access.