Chrome Add-Ons Leak Private Data in Their Code

Chrome Add-Ons Leak Private Data in Their Code

Plain-Text Web Requests Leave Users Exposed When Symantec researcher Yuanjing Guo took a closer look at a handful of high-profile Google Chrome extensions, he discovered a surprisingly simple flaw: many of them still reach out to the internet over old-fashioned HTTP instead of secure HTTPS. That…


0 Comments7 Minutes

Legitimate Remote Access Tool NetBird Abused in Sophisticated Phishing Wave

Legitimate Remote Access Tool NetBird Abused in Sophisticated Phishing Wave

Fake Job Pitch Opens the Door Cyber-criminals have launched a fresh spear-phishing operation that zeroes in on chief financial officers and senior money managers at banks, insurers, power companies, and investment houses across Europe, Africa, Canada, the Middle East, and South Asia. The scheme…


0 Comments7 Minutes

Fake AI Installers Spread Ransomware and Data-Wiping Malware

Fake AI Installers Spread Ransomware and Data-Wiping Malware

Bogus apps hide CyberLock and Lucky_Gh0$t ransomware A wave of counterfeit Fake AI Installers that pretend to be popular artificial-intelligence tools is making the rounds online, and security researchers warn that they are carrying far more than productivity promises. Analysts at Cisco…


0 Comments7 Minutes

Fortinet Spots Windows Trojan That hides on File Headers

Fortinet Spots Windows Trojan That hides on File Headers

Damaged Headers Help Malware Slip Past Defenses Fortinet’s incident-response specialists have come across a Windows program that bends the rules of how executable files are supposed to look, and that twist lets it avoid quick detection. Instead of carrying normal Disk Operating System (DOS) and…


0 Comments5 Minutes

Payroll Scam Uses SEO Tricks and Home Routers to Steal

Payroll Scam Uses SEO Tricks and Home Routers to Steal

A New Kind of Search‐Engine Trap Cyber-security specialists at ReliaQuest say they have uncovered a fresh wave of online fraud that hijacks search-engine results to trick employees into handing over their payroll passwords. The scheme, first spotted in May 2025 when it struck a large manufacturing…


0 Comments6 Minutes

Protecting Children on the Web: Understanding the Risks and How to Respond

Protecting Children on the Web: Understanding the Risks and How to Respond

Protecting Children on the Web The internet is woven into nearly every part of daily life, and for young people it can feel as natural as breathing. Yet the websites, games, and social platforms that keep kids entertained and connected also expose them to dangers that parents and guardians may not…


0 Comments7 Minutes

Fake Kling AI Ads on Facebook Spread Malware Through Bogus Websites

Fake Kling AI Ads on Facebook Spread Malware Through Bogus Websites

How the ruse starts on social media Early this year, Facebook and Instagram users began seeing what looked like perfectly normal sponsored posts for Kling AI, an image-and-video generator launched by Beijing-based Kuaishou Technology in June 2024. The service has drawn more than 22 million users as…


0 Comments7 Minutes

Chrome 136 Patches Active Data-Leak Bug

Chrome 136 Patches Active Data-Leak Bug

A fast patch for a sneaky cross-origin loophole Google has pushed an emergency update to the stable channel of its Chrome browser after a security researcher demonstrated a simple trick that lets one website siphon off information meant for another. The glitch, catalogued as CVE-2025-4664, sits…


0 Comments6 Minutes

Telegram Marketplace ‘Xinbi Guarantee’ Moves $8.4 Billion in Stablecoins

Telegram Marketplace ‘Xinbi Guarantee’ Moves $8.4 Billion

A New Player Rivals HuiOne in the Shadow Economy A Chinese-language marketplace called Xinbi Guarantee has quietly grown into a multibillion-dollar hub for illegal trade on Telegram, according to blockchain forensics firm Elliptic. The investigators say the platform, which began operating in 2022,…


0 Comments7 Minutes

Malicious Solana PyPI Package Steals Code

Malicious Solana PyPI Package Steals Code

Discovery of the Rogue Library Late last month security analysts at ReversingLabs stumbled on an impostor Python package hiding in plain sight on the official Python Package Index (PyPI). The file was uploaded under the name “solana-token,” hinting that it could help programmers interact with the…


0 Comments7 Minutes

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Privacy Preference Center