Topic: session hijacking

  • Tycoon 2FA Phishing Platform Exposes Legacy MFA Flaws

    Tycoon 2FA Phishing Platform Exposes Legacy MFA Flaws

    The Tycoon 2FA phishing kit enables attackers to easily bypass multi-factor authentication by using automated tools and fake login portals, primarily targeting Microsoft 365 and Gmail credentials. It intercepts user credentials and session cookies in real-time while mimicking legitimate login exp...

    Read More »
  • Secure Your Web Edge: Stop Browser-Based Breaches Now

    Secure Your Web Edge: Stop Browser-Based Breaches Now

    Modern web browsers are central to enterprise operations but also a major security vulnerability, increasingly targeted by cybercriminals for identity intrusions and data theft. A webinar on September 29th will explore how browsers are weaponized, covering attack methods like session hijacking an...

    Read More »
  • Hackers Exploit New 'CitrixBleed 2' NetScaler Flaw to Hijack Sessions

    Hackers Exploit New 'CitrixBleed 2' NetScaler Flaw to Hijack Sessions

    A new vulnerability dubbed "CitrixBleed 2" in Citrix NetScaler ADC and Gateway systems allows attackers to hijack sessions and bypass security, similar to a previous flaw. Two critical vulnerabilities (CVE-2025-5777 and CVE-2025-5349) affect NetScaler systems, with the more severe one enabling un...

    Read More »
  • Gambling Network Secretly Doubles as Cybercrime Infrastructure

    Gambling Network Secretly Doubles as Cybercrime Infrastructure

    A long-running cybercrime network, active since around 2011, disguises itself as an illegal online gambling service while operating a massive malware and command-and-control infrastructure primarily targeting Indonesian citizens. The operation uses an extensive network of over 328,000 domains, hi...

    Read More »
  • 6 Browser Threats Your Security Team Must Prepare for in 2025

    6 Browser Threats Your Security Team Must Prepare for in 2025

    The browser is now a primary attack surface for cyber threats, targeting cloud applications and corporate data through sophisticated campaigns. Key browser-based threats include phishing for credentials and sessions, malicious code delivery, and malicious OAuth integrations, which bypass traditio...

    Read More »
  • Malicious Chrome Extensions Steal HR Platform Credentials

    Malicious Chrome Extensions Steal HR Platform Credentials

    Malicious Chrome extensions disguised as legitimate tools were discovered stealing login credentials and sabotaging security functions on major enterprise HR and ERP platforms. The extensions enabled persistent account access through continuous cookie theft and actively blocked critical security ...

    Read More »
  • 1,200+ Citrix servers vulnerable to critical auth bypass flaw

    1,200+ Citrix servers vulnerable to critical auth bypass flaw

    Over 1,200 Citrix NetScaler systems remain vulnerable to CVE-2025-5777, a severe authentication bypass flaw enabling session hijacking and MFA bypass, with potential active exploitation despite Citrix's denial. The flaw, dubbed "Citrix Bleed 2," allows attackers to steal session tokens and creden...

    Read More »
  • Chrome Extension Backdoor Disguised as Fake Crash Alerts

    Chrome Extension Backdoor Disguised as Fake Crash Alerts

    The malicious "NexShield" browser extension, a copy of a legitimate ad blocker, uses social engineering to trick users into running a harmful PowerShell command, deploying a remote access trojan that specifically targets corporate domain-joined computers. A separate, coordinated campaign involved...

    Read More »
  • Your Browser Is Devouring Your Security

    Your Browser Is Devouring Your Security

    Modern web browsers centralize business operations but create significant security blind spots, exposing organizations to data leakage and identity compromise through concentrated sensitive activities. AI tools and browser extensions operate largely unmonitored, with employees frequently using th...

    Read More »
  • Beyond Email: The New Frontier of Phishing Attacks

    Beyond Email: The New Frontier of Phishing Attacks

    Phishing attacks are increasingly moving beyond email to exploit social media, messaging apps, and malicious ads, challenging traditional email-focused security defenses. These multi-channel attacks use sophisticated obfuscation techniques to evade detection and often target core identity platfor...

    Read More »
  • CitrixBleed 2 Vulnerability Actively Exploited

    CitrixBleed 2 Vulnerability Actively Exploited

    A critical vulnerability in Citrix NetScaler systems (CVE-2025-5777, CVSS 9.3), dubbed CitrixBleed 2, allows attackers to bypass authentication and compromise user sessions, similar to the 2023 CitrixBleed exploit. Attackers are actively exploiting the flaw, using tactics like MFA bypass, session...

    Read More »