CrashFix: Chrome extension that forces browser crashes to deliver ModeloRAT targets corporate networks
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Study finds popular Chrome add‑ons secretly harvesting clipboards, rerouting searches and mimicking trusted tools
Security researchers found several widely installed Chrome extensions performing undisclosed data collection, search redirection and brand impersonation. The findings include concrete abuse patterns — from covert clipboard siphoning to social‑engineering campaigns that push remote access trojans — underscoring gaps in vetting and the need for quicker detection and takedown.
Operation Bizarre Bazaar: Criminal Network Hijacks Exposed LLM Endpoints for Profit and Access
A coordinated criminal campaign scans for unauthenticated LLM and model-control endpoints, then validates and monetizes access—running costly inference workloads, selling API access, and probing internal networks. Some exposed targets are agentic connectors and admin interfaces that can leak tokens, credentials, or execute commands, dramatically raising the stakes beyond billable inference.
Compromised eScan Update Server Delivered Multi-Stage Malware to Users
Security researchers found that attackers pushed a malicious update through an official eScan update server on January 20, 2026, installing a multi-stage infection on both consumer and enterprise endpoints. eScan isolated affected servers, took them offline for over eight hours, and issued a manual cleanup utility while disputing aspects of the public disclosure.

