HashJack: New URL-Fragment Attack Lets Hackers Hijack AI Browsers

Security researchers have introduced a new technique called HashJack, which uses the “#” part of a URL to hide malicious instructions. This portion of a link is normally ignored by servers, making the attack hard to detect. When an AI browser or assistant loads the link, it reads the hidden instructions from the fragment. This … Continued

New Shai-Hulud Worm Campaign Puts npm Ecosystem at Serious Risk

A new malware campaign called Shai-Hulud is causing serious trouble for npm users. Security researchers have confirmed that this malware spreads like a worm inside the JavaScript ecosystem. It takes over developer accounts and injects malicious code into popular packages. Because of its scale, it is being seen as one of the biggest recent supply-chain … Continued

Iberia Confirms Supplier Breach: Loyalty Members’ Data at Risk

Iberia Airlines has informed its customers that a data breach at one of its suppliers has exposed certain customer information. The Spanish flag carrier says unauthorized access to the supplier’s systems compromised the confidentiality of some customer data. The incident highlights how third-party vendors can become weak links in enterprise security. The airline says it … Continued

Salesforce Warns of Unauthorized Data Access Through Gainsight OAuth Apps

Salesforce has announced that it detected unauthorized activity linked to OAuth connections created by applications published by Gainsight. These apps are widely used by Salesforce customers, and the unusual behavior raised concerns that some customer data may have been accessed without approval. Salesforce stressed that the incident is connected to third-party integrations, not to a … Continued

Matrix Push Exposed: How Hackers Are Weaponizing Web Notifications

Cybersecurity researchers have identified a new malicious tool called Matrix Push, which abuses browser notifications to run phishing and malware attacks. It turns the normal web-push feature into a method for attackers to reach users directly. The tool makes fake alerts look completely legitimate. Because of this, many people may not realize they are being … Continued

HackOnChat Revealed: How Attackers Hijack WhatsApp Accounts Worldwide

CTM360 has uncovered a large global campaign designed to hijack WhatsApp accounts, known as HackOnChat. The operation uses fake login portals and malicious pages that look identical to official WhatsApp services. These pages trick users into giving attackers access. The goal is to steal active sessions and verification keys. Attackers rely on two main tactics: … Continued

Iran-Linked Hackers Used AIS Data to Track Ship Days Before Missile Strike Attempt

Iran-linked hackers carried out a detailed digital reconnaissance on a commercial ship just days before a real-world missile strike attempt. Security researchers revealed that these hackers mapped the vessel’s AIS data and even accessed its onboard cameras. This activity happened shortly before the physical attack. Experts say the timing shows the cyber actions were connected … Continued

Newsletter line