Jan 01, 2026Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have disclosed details of a…
Hijack
-
-
Two malicious Chrome extensions posing as VPN tools under the name Phantom Shuttle (幻影穿梭)…
-
Application SecuritySecurity
Hackers exploit Microsoft OAuth device codes to hijack enterprise accounts
The tactic represents an evolution of techniques that financially motivated groups used earlier this…
-
Nov 25, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have disclosed details of a…
-
Factory, a San Francisco-based startup, said it disrupted an attack by at least one…
-
eSecurity Planet content and product recommendations are editorially independent. We may make money when…
-
Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens…
-
Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a recently disclosed…
-
eSecurity Planet content and product recommendations are editorially independent. We may make money when…
-
How to detect a hit Detecting a memory-based compromise in ChatGPT Atlas is not…
