Author: VanshTheHacker

  • A New Maturity Model for Browser Security: Closing the Last-Mile Risk

    A New Maturity Model for Browser Security: Closing the Last-Mile Risk

    Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser.
    It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks weren’t designed to handle. For security leaders who know

  • Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update

    Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update

    Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild.
    The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine.
    “Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary

  • U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms

    U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms

    The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one individual and the seizure of 29 financial accounts, 21 fraudulent websites, and nearly 200 computers.
    The coordinated action saw searches of 21 known or suspected “laptop farms” between June 10 and 17, 2025, across 14 states

  • Microsoft Removes Password Management from Authenticator App Starting August 2025

    Microsoft Removes Password Management from Authenticator App Starting August 2025

    Microsoft has said that it’s ending support for passwords in its Authenticator app starting August 1, 2025.
    Microsoft’s move is part of a much larger shift away from traditional password-based logins. The company said the changes are also meant to streamline autofill within its two-factor authentication (2FA) app, making the experience simpler and more secure.Over the past few years, Microsoft

  • Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

    Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories 

    Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the Verizon DBIR, attackers are more commonly using stolen

  • ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

    ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more

    Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by design” behavior quietly opens the door to risk?
    This week brings stories that make you stop and rethink what’s truly under control. It’s not always about a broken firewall or missed patch—it’s about the small choices, default settings

  • FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

    FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

    The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the airline sector.
    To that end, the agency said it’s actively working with aviation and industry partners to combat the activity and help victims.
    “These actors rely on social engineering techniques, often impersonating

  • GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

    GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool

    The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering tool.
    “Recent campaigns in June 2025 demonstrate GIFTEDCROOK’s enhanced ability to exfiltrate a broad range of sensitive documents from the devices of targeted individuals, including potentially proprietary files and

  • Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

    Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

    Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial intelligence (AI), including those that have not been directly uploaded to the service.
    According to TechCrunch, which first reported the feature, users are being served a new pop-up message asking for permission to “allow

  • Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

    Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

    Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups.
    The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard’s STRIKE team.
    “The LapDogs network has a high concentration of victims