ALL POSTS Chrome flaw let extensions hijack Gemini’s camera, mic, and file access Pieter Arntz March 3, 2026 0 Comments Researchers found a now-patched vulnerability in "Live in Chrome" that allowed a Chrome extension to inherit Gemini’s permissions. Samsung TVs stop spying on viewers in Texas. Here’s how to disable ACR anywhere Pieter Arntz March 2, 2026 0 Comments As Samsung settles a lawsuit over how its smart TVs collect and monetize viewing data using ACR, here's how the rest of us can limit the data we're sharing. A fake FileZilla site hosts a malicious download Stefan Dasic March 2, 2026 0 Comments A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past traditional monitoring. Purchase order attachment isn’t a PDF. It’s phishing for your password Pieter Arntz March 2, 2026 0 Comments A fake purchase order attachment turned out to be a phishing page designed to harvest your login details. A week in security (February 23 – March 1) Malwarebytes Labs March 2, 2026 0 Comments A list of topics we covered in the week of February 23 to March 1 of 2026 Public Google API keys can be used to expose Gemini AI data Pieter Arntz February 27, 2026 0 Comments Researchers found that Google API keys long treated as harmless can now unlock access to Gemini. Inside a fake Google security check that becomes a browser RAT Stefan Dasic February 27, 2026 0 Comments Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more. Fake Zoom and Google Meet scams install Teramind: A technical deep dive Stefan Dasic February 26, 2026 0 Comments Attackers don’t always need custom malware. Sometimes they just need a trusted brand and a legitimate tool. How to understand and avoid Advanced Persistent Threats Pieter Arntz February 26, 2026 0 Comments APT stands for Advanced Persistent Threat. But what does that actually mean, and how does it translate into the kind of threat you’re facing? Previous 1 2 3 4 5 6 … 609 Next Contributors Threat Center Podcast Glossary Scams