March 2022

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack

New phishing technique called browser-in-the-browser (BitB) attack can be xploited to act like a browser window within the browser in order to spoof a legitimate domain, which makes it possible to stage convincing phishing attacks. The method makes use of the third-party single sign-on (SSO) options embedded on websites such as “Sign in with Google”

The Browser-in-the-Browser (BITB) Attack Enabling Easier Phishing Attack Read More »

Access:7 Supply Chain Vulnerability Impacting ATMs, Medical and IoT Devices

As many as seven vulnerabilities have been disclosed in PTC’s Axeda software which could be weaponized to access medical and IoT devices without authorization. Popular known as Access:7, with weaknesses of which 3 are rated Critical in severity with the potential of affecting over 150 device models spanning over 100 different manufacturers which makes it

Access:7 Supply Chain Vulnerability Impacting ATMs, Medical and IoT Devices Read More »