John

I'm cybersecurity researcher and threat intelligence writer focused on malware campaigns, data breaches, OSINT, and emerging attack techniques. Passionate about breaking down complex security threats into clear, actionable insights.

Hackers Weaponize Open VSX Extension With Sophisticated Malware After 5,066 Downloads

Hackers Weaponize Open VSX Extension With Sophisticated Malware After 5,066 Downloads

Developers reaching for familiar tools in open-source marketplaces might be inadvertently handing over their credentials. Researchers recently uncovered a malicious VS Code extension on Open VSX, disguised as the popular Angular Language Service. Published just two weeks ago, it racked up 5,066 downloads before activating its payload. This isn’t a simple Trojan; it’s a multi-stage […]

Hackers Weaponize Open VSX Extension With Sophisticated Malware After 5,066 Downloads Read More »

Threat Actors Abuse Google Ads to Push Fake Mac Cleaners

Threat Actors Abuse Google Ads to Push Fake Mac Cleaners

Imagine searching Google for “mac cleaner” or “clear cache macOS,” clicking a shiny sponsored ad, and without writing handing over your Mac keys to attacker. Cybersecurity researchers have uncovered a fresh campaign abusing Google Ads to redirect users to malicious pages that mimick Apple’s site. These Mac owners with promise of simple storage fixes, only

Threat Actors Abuse Google Ads to Push Fake Mac Cleaners Read More »

Open Directory Leak Exposes BYOB Framework Across OSes

Open Directory Leak Exposes BYOB Framework Across OSes

Threat hunters recently uncovered an exposed directory on a live command-and-control (C2) server hosting a complete Build Your Own Botnet (BYOB) framework deployment. The server at IP 38.255.43.60:8081, hosted by Hyonix in the US, was serving droppers, stagers, payloads, and post-exploitation modules for cross-platform attack. This modular Python-based RAT targets Windows, Linux, and macOS, with

Open Directory Leak Exposes BYOB Framework Across OSes Read More »

Malicious Outlook Add-ins Used to Steal Emails Silently

Malicious Outlook Add-ins Used to Steal Emails Silently

Malicious Outlook Add-ins Used to Steal Emails In a finding that exposes a hidden gap in Microsoft 365 monitoring, Varonis Threat Labs has uncovered how attackers can quietly abuse Outlook add-ins to extract sensitive email data from organizations. They call this technique “Exfil Out&Look.” These add-ins are meant to boost productivity by integrating web applications

Malicious Outlook Add-ins Used to Steal Emails Silently Read More »

Cal.com’s Access Control Mess: How It Let Attackers Hijack Accounts and Dump Millions of Bookings

Cal.com’s Access Control Mess: How It Let Attackers Hijack Accounts and Dump Millions of Bookings

Cal.com’s Access Control Mess Researchers just dug into Cal.com Cloud, that open source scheduling tool folks use as a Calendly alternative with calendar syncs, team features, and APIs. What they found were some nasty, interlinked access control issues that let anyone fully take over user accounts or snoop on every booking, including private meeting details

Cal.com’s Access Control Mess: How It Let Attackers Hijack Accounts and Dump Millions of Bookings Read More »

Generative Application Firewall

Generative Application Firewall: The Missing Shield for AI Chat Apps

Generative Application Firewall Generative AI is everywhere these days, powering chatbots, code helpers, and content generators in apps we use daily. This feels like the early days of web apps, when hackers found ways to slip past basic network defenses. Back then, we got Web Application Firewalls (WAFs) to plug the gaps. Now, a new

Generative Application Firewall: The Missing Shield for AI Chat Apps Read More »

Technitium: Self-Hosted DNS Server for Enhanced Privacy and Security

Technitium: Self-Hosted DNS Server for Enhanced Privacy and Security

Where your ISP logs every website you visit and advertisers track your every click, who really controls your internet? Most folks don’t think twice about DNS, the Domain Name System, the quiet hero that translates “google.com” into an IP address so your browser can load pages. But here’s the kicker: your default setup often hands

Technitium: Self-Hosted DNS Server for Enhanced Privacy and Security Read More »