What's Hot
Author: Zeel_Cyberexpert
Modern web browsers have become powerful platforms that host sensitive work, communication, and decision-making tools — especially artificial intelligence services such as ChatGPT and DeepSeek. As a result, browser activity now contains some of the most sensitive personal and business data users handle. This makes browsers, extensions, and AI tools attractive targets for data harvesting and surveillance. Protecting yourself requires understanding where risks come from and how to reduce exposure. Why Browser Extensions Are a Security Risk Browser extensions run with deep access inside the browser environment. Depending on permissions, an extension may be able to: Even extensions that appear…
Cybersecurity researchers have uncovered a coordinated abuse of the Google Chrome Web Store involving two browser extensions that were secretly designed to collect and exfiltrate user conversations from artificial intelligence platforms such as ChatGPT and DeepSeek, along with detailed browsing information. The extensions appeared as legitimate AI productivity tools and were marketed as helpers that integrate multiple AI models into the browser. However, behind the scenes, they operated as surveillance tools that quietly harvested sensitive data and transmitted it to servers controlled by unknown threat actors. Investigators confirmed that the two extensions together had been installed by more than 900,000…
The first days of 2026 have already shown that cyber threats didn’t reset with the new year. Instead of dramatic headline-grabbing attacks, most incidents this week followed a familiar pattern — quiet abuse of trusted systems that people use every day. Browser extensions, software updates, login notifications, and even AI tools were misused in ways that felt normal to users, but harmful in reality. That is what made these attacks effective. Below is a summary of the most important cybersecurity developments from this week, explained in simple terms. A Silent Botnet Campaign Is Still Growing Security researchers confirmed that a…
Leduc County, a local government authority in Alberta, Canada, has confirmed that it was the victim of a ransomware cyberattack that disrupted its internal IT systems. The incident was detected on December 25, 2025, when officials noticed unusual activity and partial system outages. A forensic investigation later confirmed that the disruption was caused by a malicious ransomware attack. What Happened? According to county officials, attackers attempted to compromise internal digital systems and restrict access to critical services. As a precaution, several systems were taken offline to prevent further damage and to secure sensitive information. The county immediately engaged a professional…
These platforms are widely used by students and professionals to learn practical cybersecurity skills through hands-on labs, challenges, and real-world simulation. 1. TryHackMe What it is:An online learning platform that teaches cybersecurity through guided, hands-on labs. What students learn: Why it’s good: Best for: Beginners to intermediate learners. 2. Hack The Box Academy What it is:A technical training platform focused on offensive and defensive security. What students learn: Why it’s good: Best for: Intermediate to advanced students. 3. PortSwigger Web Security Academy What it is:A free learning platform focused entirely on web application security. What students learn: Why it’s good:…
A cyber espionage group tracked as Transparent Tribe has been linked to a new wave of targeted attacks against Indian government agencies, academic institutions, and strategic research organizations. The campaign uses socially engineered delivery mechanisms and living-off-the-land binaries to deploy a remote access trojan (RAT) that enables long-term access and data collection from compromised systems. Initial Access The attack chain begins with spear-phishing emails carrying compressed archives that contain Windows shortcut (LNK) files disguised as legitimate PDF documents. The LNK files are crafted to execute hidden commands while simultaneously displaying a decoy document to avoid raising suspicion. When opened, the…
1. Nessus Type: Vulnerability Scanner What it does:Nessus scans servers, networks, and systems to find known security vulnerabilities, outdated software, and misconfigurations. Used for:Identifying weak points in IT infrastructure before attackers can exploit them. Why it matters:It helps organizations understand what is exposed and what needs patching. 2. Metasploit Type: Penetration Testing Framework What it does:Metasploit allows security teams to safely test whether vulnerabilities can actually be exploited. Used for:Simulating real-world attacks to verify the impact of vulnerabilities. Why it matters:It shows whether a reported vulnerability is truly dangerous or just theoretical. 3. Wireshark Type: Network Protocol Analyzer What it…
What happened? Initial investigation indicates that approximately 6–7% of registered users — estimated at about 108,000 to 126,000 people — may have been affected by this breach. Data at risk Response and investigation Extortion and threat activity
The beginning of a new year brings a major shift in digital activity. New accounts are created, old ones are closed, systems are updated, access rights change, and people start using new devices and services. This transition period changes how digital risks appear and how protection systems respond. Understanding this shift helps explain why the first weeks of a new year are important for digital security. 1. What Changes Digitally at the Start of a New Year At the start of a new year: This creates a lot of legitimate system changes — which makes it harder to distinguish between…
Two former cybersecurity professionals in the United States have pleaded guilty in a federal court to conspiring with a ransomware group involved in cyber extortion attacks against American companies. The individuals admitted to participating in activities that helped deploy ransomware, encrypt victim networks, and demand ransom payments from targeted organizations. As part of the criminal case, both individuals now face potential prison sentences of up to 20 years each under U.S. federal law. Sentencing is scheduled to take place in 2026. The case is being treated as a significant enforcement action against individuals involved in cybercrime, particularly due to the…