Two Google Chrome extensions turn malicious after ownership transfer
The extensions were modified to disable browser protections, inject malicious code, and steal data.
2 min read
Cybersecurity Help is a global vulnerability intelligence provider. We monitor vulnerabilities in software from 60,000+ vendors and help customers prevent potential data breaches by addressing them proactively.
Request DemoThe extensions were modified to disable browser protections, inject malicious code, and steal data.
2 min readThe CL-UNK-1068 group uses custom malware, modified open-source utilities, and legitimate system tools to maintain long-term access.
3 min readThe campaign, observed in February 2026, directs users to launch Windows Terminal using the Windows + X → I shortcut.
3 min readThe malware uses the Deno runtime environment to execute malicious commands on compromised systems.
2 min readIn brief: Cisco warns of two actively exploited flaws in Catalyst SD-WAN Manager, researchers details a new iOS exploit kit called ‘Coruna,’ and more.
18 min read