Staying Safe with Chrome Extensions (Google Online Security Blog)

Actualités, Sécurité
Posted by Benjamin Ackerman, Anunoy Ghosh and David Warren, Chrome Security Team Chrome extensions can boost your browsing, empowering you to do anything from customizing the look of sites to providing personalized advice when you’re planning a vacation. But as with any software, extensions can also introduce risk. That’s why we have a team whose only job is to focus on keeping you safe as you install and take advantage of Chrome extensions. Our team: Provides you with a personalized summary of the extensions you’ve installed Reviews extensions before they’re published on the Chrome Web Store Continuously monitors extensions after they’re published A summary of your extensions The top of the extensions page (chrome://extensions) warns you of any extensions you have installed that might pose a security risk. (If you…
Read More

Staying Safe with Chrome Extensions

Actualités
Posted by Benjamin Ackerman, Anunoy Ghosh and David Warren, Chrome Security Team Chrome extensions can boost your browsing, empowering you to do anything from customizing the look of sites to providing personalized advice when you’re planning a vacation. But as with any software, extensions can also introduce risk. That’s why we have a team whose only job is to focus on keeping you safe as you install and take advantage of Chrome extensions. Our team: Provides you with a personalized summary of the extensions you’ve installed Reviews extensions before they’re published on the Chrome Web Store Continuously monitors extensions after they’re published A summary of your extensions The top of the extensions page (chrome://extensions) warns you of any extensions you have installed that might pose a security risk. (If you…
Read More

Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs

Actualités
Cybersecurity researchers have disclosed details of a now-patched security flaw in Phoenix SecureCore UEFI firmware that affects multiple families of Intel Core desktop and mobile processors. Tracked as CVE-2024-0762 (CVSS score: 7.5), the "UEFIcanhazbufferoverflow" vulnerability has been described as a case of a buffer overflow stemming from the use of an unsafe variable in the Trusted Platform
Read More

French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks

Actualités
State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities, the country's information security agency ANSSI said in an advisory. The attacks have been attributed to a cluster tracked by Microsoft under the name Midnight Blizzard (formerly Nobelium), which overlaps with activity tracked as APT29, BlueBravo, Cloaked Ursa, Cozy Bear,
Read More

Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024

Actualités
Highlights Complex Tool Landscape: Explore the wide array of cybersecurity tools used by MSPs, highlighting the common challenge of managing multiple systems that may overlap in functionality but lack integration.Top Cybersecurity Challenges: Discuss the main challenges MSPs face, including integration issues, limited visibility across systems, and the high cost and complexity of maintaining
Read More

Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021

Actualités
Cyber espionage groups associated with China have been linked to a long-running campaign that has infiltrated several telecom operators located in a single Asian country at least since 2021. "The attackers placed backdoors on the networks of targeted companies and also attempted to steal credentials," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News
Read More