Skip to main content

Search

Items tagged with: security


Fake AI Chrome extensions with 300K users steal credentials, emails


A malicious campaign of 30 Chrome extensions masquerading as AI assistants has infected over 300,000 users, stealing credentials, email content, and browsing data1. The extensions, dubbed "AiFrame" by LayerX researchers, share common infrastructure under the domain tapnetic[.]pro and use iframes to load remote content rather than implementing actual AI functionality1.

Popular malicious extensions still available on the Chrome Web Store include:
- AI Sidebar (70,000 users)
- AI Assistant (60,000 users)
- ChatGPT Translate (30,000 users)
- AI GPT (20,000 users)

The extensions specifically target Gmail data through content scripts that extract email content, drafts, and thread text. They can also capture voice recordings using Web Speech API and transmit data to remote servers controlled by the operators1.


  1. BleepingComputer - Fake AI Chrome extensions with 300K users steal credentials, emails ↩︎ ↩︎ ↩︎


Wenn Tech zur Religion wird: Warum gute Prinzipien ohne Kontext zu Dogmen werden – und wie Orientierung und realistische Schritte mehr Menschen mitnehmen. 👇

kuketz-blog.de/das-toleranzpro…

#datenschutz #opensource #tech #privacy #fedilz #sicherheit #security


🐛 NEW SECURITY CONTENT 🐛

💻 macOS Tahoe 26.3 - 57 bugs fixed
support.apple.com/en-us/126348
💻 macOS Sonoma 14.8.4 - 42 bugs fixed
support.apple.com/en-us/126350
📱 iOS and iPadOS 26.3 - 41 bugs fixed
support.apple.com/en-us/126346
📱 iOS and iPadOS 18.7.5 - 37 bugs fixed
support.apple.com/en-us/126347
💻 macOS Sequoia 15.7.4 - 36 bugs fixed
support.apple.com/en-us/126349
🥽 visionOS 26.3 - 29 bugs fixed
support.apple.com/en-us/126353
⌚ watchOS 26.3 - 18 bugs fixed
support.apple.com/en-us/126352
📺 tvOS 26.3 - 16 bugs fixed
support.apple.com/en-us/126351

#apple #cybersecurity #infosec #security #ios


"Switzerland’s military has terminated its contract with Palantir… following a security audit… concluded that U.S. intelligence agencies could potentially access sensitive Swiss defense data… significant reputational warning for the data analytics firm"

newscase.com/palantirs-swiss-e…

#Palantir #Dataprivacy #Security


France launches "LaSuite," an open-source office suite for digital sovereignty, reducing reliance on foreign proprietary software. 🖥️
Built on Matrix/TChap, LiveKit/Visio, Grist, and Drive—all MIT-licensed for any organization to deploy. 🇪🇺

🔗 sinologic.net/en/2026-01/franc…

#TechNews #OpenSource #France #French #DigitalSovereignty #FOSS #Matrix #Privacy #EU #Security #Software #Linux #SelfHost #Government #Europe #Data #IT #PublicSector #Microsoft #Office #Tech #Cloud #LibreOffice


Fake 7-Zip downloads are turning home PCs into proxy nodes




The Shadow Campaigns: Uncovering Global Espionage



France dumps Zoom and Teams as Europe seeks digital autonomy from the US

flip.it/Fc_v.l

#Technology #Zoom #Teams #France #US #FRpol #EUpol #Technology #Safety #Security #Politics


Vulnerability-Lookup 3.0.0



Notepad++'s update servers have been compromised by Chinese hackers and all users had been exposed to malware. The developer estimated the overall compromise period spanned from June through December 2, 2025.
Users should update to version 8.9.1 (or superior) immediately.

Source: notepad-plus-plus.org/news/hij…

#security #vulnerability #windows #text #editor #notepad #foss #freesoftware #software


Self-Host Weekly (30 January 2026)

#AI tags (and the #lobster everyone is going crazy over), software updates and launches, a spotlight on #VanillaCookbook - a simple #recipe platform, and more in this week's #selfhosted recap!

selfh.st/weekly/2026-01-30/

#selfhost #selfhosting #newsletter #foss #opensource #fosdem #homelab #privacy #security #sysadmin #devops #smarthome #fediverse #clawdbot #moltbot #openclaw #immich


Phishing attack: Numerous journalists targeted in attack via Signal Messenger



On the run up of #DataPrivacyDay we've asked the Tuta Community about your preferred Google alternatives.

Here's what you said about your favorite browsers! 🎉

#privacy #security


#Microsoft hat erstmals öffentlich bestätigt, dass das Unternehmen Bitlocker-Verschlüsselungsschlüssel an Strafverfolgungsbehörden herausgibt, wenn diese einen gültigen Durchsuchungsbeschluss vorlegen.
golem.de/news/datenschutzdebat…
#USA #Security #Drittland #Datenschutz


If you use #GMAIL, you should be aware that as of this post's timestamp, their spam detection is down and it is likely your emails aren't being scanned for spam, unverified senders, or harmful software.

"We are aware that some Gmail users are experiencing misclassification of emails in their inbox and additional spam warnings. We are actively working to resolve the issue. As always, we encourage users to follow standard best practices when engaging with messages from unknown senders."

"We advise the users to be extra diligent in lieu of missing spam checks." #Spam #Google #InfoSec #Security #Phishing

Google Status:
google.com/appsstatus/dashboar…


Vulnerability-Lookup 2.21.0



Here’s what The Counteroffensive is reading today:

Putin offered to give $1 billion to #Trump’s Board of Peace from the $5 billion Russian frozen assets in the U.S, at a Russia’s #Security Council meeting.

The rest of the funds will be put to Ukraine’s post-war reconstruction.

bloomberg.com/news/articles/20…
#news #ukraine #trump #russia


GNU InetUtils Security Advisory: remote authentication by-pass in telnetd


The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter. If the client supply a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes. This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication. Severity: High Vulnerable versions: GNU InetUtils since version 1.9.3 up to and including version 2.7.


Welcome to what we like to call Schrodinger's Tech Politics where all political platforms are valid but let's now attack an entire political concept.

Brought to you by the @web3privacy chat.

If this is the future of #foss, #security and #privacy, we're fucked.

@fosdem #fosdem #fediverse #mastodon


Dissecting CrashFix: KongTuke's New Toy | Huntress


In January 2026, Huntress Senior Security Operations Analyst Tanner Filip observed threat actors using a malicious browser extension to display a fake security warning, claiming the browser had "stopped abnormally" and prompting users to run a “scan” to remediate the threats. Our analysis revealed this campaign is the work of KongTuke, a threat actor we have been tracking since the beginning of 2025. In this latest operation, we identified several new developments: a malicious browser extension called NexShield that impersonates the legitimate uBlock Origin Lite ad blocker, a new ClickFix variant we have dubbed “CrashFix” that intentionally crashes the browser then baits users into running malicious commands, and ModeloRAT, a previously undocumented Python RAT reserved exclusively for domain-joined hosts.


Malware peddlers are now hijacking Snap publisher domains



New IP leak discovered in Telegram: the built-in proxy exposes your real IP using a single-click flaw!

When you click on a "tg://proxy" link, Telegram starts a connection while ignoring your proxy settings. This exposes your real public IP address, leaking your identity online.

The malicious link appears as a nickname, but will steal your real IP address as soon as the user profile is shown. Android and iOS are both affected. Currently the only solution is using a VPN. Telegram has declared that it will only add a warning popup.

Details: dig.watch/updates/telegram-ip-…

Discovered by: Saurabh
Reported by: 0x6rss and GangExposed RU.

#telegram #security #vulnerability #android #ios #software #opensource #foss #cloud #im #chat #proxy #vpn


Is Germany Looking to Put a Backdoor into Arch Linux?