Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

THN Daily Updates
Newsletter
cover

SQL Essentials For Dummies ($10.00 Value) FREE for a Limited Time

A right-to-the-point guide on all the key topics of SQL programming

Download Now Sponsored
LATEST NEWS Jun 6, 2025

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Securi...

Read More
Twitter Facebook LinkedIn

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos. "The attack was instrumented via a legitimate endpoint ...

Read More
Twitter Facebook LinkedIn

Vanta Delivers: AI-powered Trust Management Platform

AI takes center stage as Jeremy Epling (CPO at Vanta) introduces new AI features that help to answer questions, identify errors, suggest improvements, and increase productivity from evidence to audit. Join the virtual event on June 12.

Read More
Twitter Facebook LinkedIn

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hard-Coded Credentials

Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. "Several...

Read More
Twitter Facebook LinkedIn

Researchers Detail Bitter APT's Evolving Tactics as Its Geographic Scope Expands

The threat actor known as Bitter has been assessed to be a state-backed hacking group that's tasked with gathering intelligence that aligns with the interests of the Indian government. That's according to new findings ...

Read More
Twitter Facebook LinkedIn

Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs re...

Read More
Twitter Facebook LinkedIn

Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware

An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024. The activity is tied to a threat group ESET tracks as BladedFeline, which i...

Read More
Twitter Facebook LinkedIn

DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet and dark web domains associated with an illicit carding marketplace called BidenCash. "The operators...

Read More
Twitter Facebook LinkedIn
cover

SQL Essentials For Dummies ($10.00 Value) FREE for a Limited Time

A right-to-the-point guide on all the key topics of SQL programming

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi