Topic: browser security

  • Secure Your Web Edge: Stop Browser-Based Breaches Now

    Secure Your Web Edge: Stop Browser-Based Breaches Now

    Modern web browsers are central to enterprise operations but also a major security vulnerability, increasingly targeted by cybercriminals for identity intrusions and data theft. A webinar on September 29th will explore how browsers are weaponized, covering attack methods like session hijacking an...

    Read More »
  • 6 Browser Threats Your Security Team Must Prepare for in 2025

    6 Browser Threats Your Security Team Must Prepare for in 2025

    The browser is now a primary attack surface for cyber threats, targeting cloud applications and corporate data through sophisticated campaigns. Key browser-based threats include phishing for credentials and sessions, malicious code delivery, and malicious OAuth integrations, which bypass traditio...

    Read More »
  • Neon Cyber Launches Workforce Cybersecurity Platform

    Neon Cyber Launches Workforce Cybersecurity Platform

    Neon Cyber has launched the industry's first Workforce Cybersecurity Platform (WCP), focusing on human-centric threats like phishing and credential misuse to protect users across browsers, SaaS, and enterprise systems. The platform offers AI-driven phishing protection, visibility into shadow IT, ...

    Read More »
  • Trusted Chrome VPN Caught Spying on Users

    Trusted Chrome VPN Caught Spying on Users

    A trusted Chrome VPN extension, FreeVPN.One, was revealed to be spyware that secretly harvested user data, including screenshots of browsing activity, after deceptive updates. The malicious behavior involved a two-stage process using injected scripts and delays to capture screenshots via Chrome's...

    Read More »
  • MonsterRAT: Stealthy Malware Threatens Windows Systems

    MonsterRAT: Stealthy Malware Threatens Windows Systems

    A sophisticated phishing campaign distributes the previously undocumented MonsterRAT malware, which targets Windows systems and grants attackers full administrative control through a multi-stage infection process. The attack uses phishing emails disguised as business correspondence to deliver the...

    Read More »
  • Perplexity Comet Browser Prompt Injection Vulnerability Exposed

    A security flaw in Perplexity's Comet AI browser allows attackers to inject malicious prompts via webpages, potentially accessing sensitive information from other open tabs. The vulnerability occurs because the AI processes webpage content without distinguishing between legitimate user instructio...

    Read More »