With modern work happening across a network of decentralized internet apps, and more varied communication channels outside of email, it's harder to stop users from interacting with malicious content. This article via The Hacker News outlines six rising browser-based threats: Advanced phishing targeting credentials and sessions; ClickFix-style attacks using fake CAPTCHAs to trick users into running malicious commands; Malicious OAuth apps bypassing MFA; Harmful browser extensions stealing data; Malicious files (like HTAs and SVGs) delivering malware; And the exploitation of stolen credentials due to MFA gaps. Attacks are increasingly happening in the browser. That makes it the perfect place to detect and respond to these attacks. But right now, the browser is a blind-spot for most security teams. Full article; Hiring? Get in touch; tom.bedder@agscyber.com #cyberjobs #cybercareers #cyberawareness
Browser-based threats on the rise: How to detect and respond
More Relevant Posts
-
Microsoft Discovers New Variant of XCSSet Malware for macOS in Targeted Attacks 🔍 Microsoft has identified a new variant of the XCSSet malware targeting macOS systems, used in specific attack campaigns. This threat poses a significant risk to developers and Apple users. Key Features of the New Variant 🚨 - Uses advanced obfuscation techniques to evade detection - Distributed through compromised Xcode projects - Capable of stealing clipboard data and keychain credentials - Collects sensitive information from applications like Telegram and Skype - Can take screenshots of the infected system Infection Mechanism ⚙️ The malware spreads through manipulated development projects, exploiting developers' trust in code repositories. Once executed, it establishes persistence and begins its malicious activities. Security Recommendations 🛡️ - Verify the authenticity of Xcode projects before use - Keep the operating system and applications updated - Use macOS-specific security solutions - Implement secure development practices This detection highlights the growing sophistication of malware targeting macOS platforms and the need for continuous vigilance. For more information, visit: https://enigmasecurity.cl Was this information helpful? Support our work to continue sharing relevant security analyses: https://lnkd.in/er_qUAQh Let's connect to keep discussing cybersecurity: https://lnkd.in/e56qXi9n #MacOSSecurity #XCSSet #Ciberseguridad #MalwareAnalysis #ThreatIntelligence #MicrosoftSecurity #AppleSecurity #CyberThreats #InfoSec 📅 Fri, 26 Sep 2025 19:45:07 +0000 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
North Korean Cyber Threats: ClickFix Lures and Evolving Malware Campaigns Cybersecurity researchers are increasingly vigilant as attackers linked to North Korea have been observed using ClickFix-style lures to distribute sophisticated malware known as BeaverTail and InvisibleFerret. This development highlights a shift in tactics within the ongoing Contagious Interview campaign, traditionally targeting software developers but now […] https://lnkd.in/d-KzbH93 DPRK Hackers Deploy ClickFix to Spread BeaverTail Malware in Crypto Job Scams
To view or add a comment, sign in
-
Phishing is not just an email problem. Attackers are finding new ways to reach your employees, taking phishing outside of the mailbox: 📱 Social media and instant messaging apps 📝 Sending messages inside trusted apps, or triggering automated emails look legit 📧 Targeting personal devices to bypass security software 🔍 Malicious ads (malvertising) in search engines and on web pages With work happening across so many platforms, employees are easier targets than ever. They’re signed into LinkedIn, X, WhatsApp, Signal, even message boards like Reddit — all on work devices. And attacks outside of email often go unreported, leaving teams unprepared. Today's delivery vector could be almost anything. Read our latest blog to see how security teams can level the playing field. https://lnkd.in/gDFmAWsj
To view or add a comment, sign in
-
Focusing on e-mail as the primary delivery vector for phishing is the kind of list-based thinking attackers have exploited for quite some time. See our latest post to learn how attackers are taking #phishing out of the mailbox ⬇️ ⬇️ ⬇️
Phishing is not just an email problem. Attackers are finding new ways to reach your employees, taking phishing outside of the mailbox: 📱 Social media and instant messaging apps 📝 Sending messages inside trusted apps, or triggering automated emails look legit 📧 Targeting personal devices to bypass security software 🔍 Malicious ads (malvertising) in search engines and on web pages With work happening across so many platforms, employees are easier targets than ever. They’re signed into LinkedIn, X, WhatsApp, Signal, even message boards like Reddit — all on work devices. And attacks outside of email often go unreported, leaving teams unprepared. Today's delivery vector could be almost anything. Read our latest blog to see how security teams can level the playing field. https://lnkd.in/gDFmAWsj
To view or add a comment, sign in
-
🚨 New Malware Targets Users via Fake Installers A new Stealit malware campaign is using #Node.js’s Single Executable feature to deliver malicious payloads through fake game and #VPN installers. It steals data, controls #webcams, and deploys #ransomware on #Windows and #Android devices. 🔑 Key Points: #Malware spreads via fake installers on file-sharing sites. It uses anti-detection tactics to avoid security tools. Targets both Windows and Android users. 💡 Protection Tips: Avoid downloading from untrusted sources. Keep security tools updated and configured. Educate users on the risks of fake software. #Cybersecurity #Malware #DataProtection #NodeJS #RAT #TechSecurity #SOC #HR #TA #opentowork #hiring #Hrms #Sales #SaasSales #BusinessDevelopment #EndToEndSales #CorporateSales #ProductDemonstration #CorporateSelling #NewClientAcquisition #Hunting #B2BSales #RevenueGeneration #SoftwareSales #EnterpriseSales #NewBusinessAcquisition
To view or add a comment, sign in
-
Can you tell the difference between these URLs? microsoft .com mićrosoft .com The difference may not be as obvious in employees' day-to-day work. Here's why this matters: ⚠️ Attackers use unicode characters to create domains that look identical to legitimate sites ⚠️ These deceptive domains are used for malicious file downloads, phishing campaigns, and brand spoofing ⚠️ Traditional security solutions struggle to catch these deceptive domains ⚠️ Users unknowingly download malicious files from sites they think are trustworthy SquareX's solution: ✅ Automatically detects unicode characters in URLs ✅ Blocks file downloads from suspicious domains in real-time ✅ Protects users from sophisticated domain spoofing attacks Watch how our Browser Detection & Response solution stops unicode domain attacks before they can compromise your organization. Learn more: https://hubs.la/Q03LSvwQ0 #cybersecurity #browsersecurity #enterprisesecurity
To view or add a comment, sign in
-
Cyber-Security Daily-Dose (News)📑👩💻 14-Oct-2025 (674) 📑 >New WhatsApp Worm Attacks Users with Banking Malware to Users Login Credentials. >Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity. >EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed. >Happy DOM Vulnerability Exposes 2.7 Million Users To Remote Code Execution Attacks. Source: https://lnkd.in/g3vSV5KW #cybersecurity #edr #attack #microsoft #crowdstrike #foresic #id #whatsapp #mdm #india #india #us #
To view or add a comment, sign in
-
🔒 Understanding Punycode Attacks: Examples, Cyrillic Letters, and Mitigation Punycode attacks, also called IDN homograph attacks, trick users into visiting malicious websites that look identical to legitimate ones. Hackers use Unicode characters that resemble standard Latin letters to create deceptive domains. Examples of Punycode Attacks: - Google phishing: gоogle.com (Cyrillic о) → looks like google.com - PayPal phishing: раypal.com (Cyrillic р) → looks like paypal.com - Apple phishing: аpple.com (Cyrillic а) → looks like apple.com What is Cyrillic “р”? The Cyrillic “р” is a letter from the Cyrillic alphabet, used in languages such as Russian, Ukrainian, and Bulgarian. - It looks identical to the Latin “p” in English - Unicode: U+0440 - Attackers can register domains like “раypal.com” that appear legitimate but are technically different How It Works: Hackers register domains with these Unicode characters. Browsers convert them to Punycode (ASCII-compatible encoding), like xn--paypal-43d.com, which users often cannot distinguish from the real domain. Mitigation Strategies: 1. Always inspect URLs carefully before clicking or entering credentials 2. Use modern browsers that detect homograph attacks and warn users 3. Enable email and web security solutions that filter suspicious domains 4. Educate employees and users about visually similar domains 5. Use DNS security solutions that block malicious domains Key takeaway: Awareness and proper tools are your best defense against Punycode attacks #CyberSecurity #InfoSec #Phishing #Punycode #IDNAttack #CyberAwareness #ThreatIntelligence #SOC #BlueTeam #EmailSecurity #EndpointSecurity #SecurityOps #CyberDefense #Hackers #TechSecurity #SecurityAnalyst #CyberAttack #CyberRisk #Malware #CyberProtection #DigitalSafety #OnlineSecurity #SecurityAwareness #NetworkSecurity #SOCAnalyst #IncidentResponse #CyberEducation #CyberThreats
To view or add a comment, sign in
-
BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers and digital marketing professionals to deliver a previously undocumented malware called Vampire Bot. "The attackers pose as recruiters, distributing malicious files disguised as job descriptions and corporate documents," Aryaka Threat Research Labs researchers Aditya K Sood and Varadharajan K said in a report shared with The Hacker News. "When opened, these lures trigger the infection chain of a Go-based malware." The attack chains, per the cybersecurity company, leverage ZIP archives containing decoy PDF documents along with malicious shortcut (LNK) or executable files that are masked as PDF to trick users into opening them. When launched, the LNK file runs an embedded PowerShell script that reaches out to an external server to download a lure document, a PDF for a marketing job at Marriott. https://lnkd.in/ev_gpqm9 Please follow Divye Dwivedi for such content. #DevSecOps, #SecureDevOps, #CyberSecurity, #SecurityAutomation, #CloudSecurity, #InfrastructureSecurity, #DevOpsSecurity, #ContinuousSecurity, #SecurityByDesign, #SecurityAsCode, #ApplicationSecurity, #ComplianceAutomation, #CloudSecurityPosture, #SecuringTheCloud, #AI4Security #DevOpsSecurity #IntelligentSecurity #AppSecurityTesting #CloudSecuritySolutions #ResilientAI #AdaptiveSecurity #SecurityFirst #AIDrivenSecurity #FullStackSecurity #ModernAppSecurity #SecurityInTheCloud #EmbeddedSecurity #SmartCyberDefense #ProactiveSecurity
To view or add a comment, sign in
-
Don't be scared - be prepared! October is Cyber Security Awareness Month, a needed annual reminder of the dangers of cybercrime for everyone. Last year alone, over 880,000 Americans were impacted by online scams. Data breaches alone have risen 72% in the past two years. Using strong passwords, being wary of suspicious links and emails (phishing), and avoiding sharing personal information are three easy ways to protect yourself and the ones you love from malicious cyber attacks! Looking for a workplace culture committed to safety and security? Learn more about #LSS careers at https://lnkd.in/eaP9bAA #Cybersecurity #CybersecurityAwarenessMonth #hiring #jobs
To view or add a comment, sign in
-
Spot-on observation — browsers are becoming the frontline for modern attacks, yet many security teams still lack visibility. 🌐⚠️ Highlighting these six threats reinforces the need for browser-focused detection and response strategies. Closing this blind spot is key to staying ahead of attackers in today’s decentralized work environment.