Rapid URL Indexer Chrome extension revolutionizes URL indexing with one-click submission to Google Search. Features include automatic indexability checks, bulk URL submission up to 10,000 URLs, and instant index status verification. Built by SEOs for SEO professionals. #RapidURLIndexer #SEO #ChromeExtension https://rapidurlindexer.com/google-chrome-extension/
Rapid URL Indexer for Google Chrome (Browser Extension)

Rapid URL Indexer comes with a Google Chrome browser extension that allows you to submit URLs for Google indexing with a single click.

Rapid URL Indexer

59 Victims, Zero Authentication: A ClickFix Campaign Force-Installs a Chrome Extension Banking Stealer and Leaves the Entire C2 Wide Open

Pulse ID: 69e06a4020aab69afffdb741
Pulse Link: https://otx.alienvault.com/pulse/69e06a4020aab69afffdb741
Pulse Author: Tr1sa111
Created: 2026-04-16 04:49:04

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Bank #Chrome #ChromeExtension #CyberSecurity #InfoSec #OTX #OpenThreatExchange #RCE #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure

Pulse ID: 69e06a47f33088e3fdb5744f
Pulse Link: https://otx.alienvault.com/pulse/69e06a47f33088e3fdb5744f
Pulse Author: Tr1sa111
Created: 2026-04-16 04:49:11

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Chrome #ChromeExtension #CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure

A coordinated campaign of 108 malicious Chrome extensions operated through shared command-and-control infrastructure at cloudapi[.]stream has been identified, collectively accounting for approximately 20,000 installations. The campaign spans multiple threat categories: 54 extensions steal Google account identities via OAuth2, one extension actively exfiltrates Telegram Web sessions every 15 seconds, and 45 extensions contain a universal backdoor enabling arbitrary URL execution on browser startup. Published under five distinct publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt), these extensions masquerade as legitimate tools including Telegram sidebar clients, slot games, YouTube and TikTok enhancers, and translation utilities. All extensions route stolen credentials, user identities, and browsing data to servers controlled by the same operator, with infrastructure confirming a Malware-as-a-Service business model.

Pulse ID: 69de5f631a2f4bca81392ccd
Pulse Link: https://otx.alienvault.com/pulse/69de5f631a2f4bca81392ccd
Pulse Author: AlienVault
Created: 2026-04-14 15:38:11

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Browser #Chrome #ChromeExtension #Cloud #CyberSecurity #Google #InfoSec #Malware #MalwareAsAService #OTX #OpenThreatExchange #RAT #Telegram #Troll #YouTube #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

59 Victims, Zero Authentication: A ClickFix Campaign Force-Installs a Chrome Extension Banking Stealer and Leaves the Entire C2 Wide Open

A Brazilian banking fraud operation leveraging ClickFix social engineering was discovered through a community tip, exposing a completely unauthenticated command-and-control infrastructure. The campaign deploys a malicious Chrome extension masquerading as a Banco Central do Brasil tool, force-installed via Chrome Cloud Management enrollment tokens. The extension achieves zero antivirus detections while targeting eight Brazilian financial institutions. At investigation time, 59 machines were compromised with seven active connections. The operator's C2 server exposed all endpoints without authentication, including admin panels, live victim screenshots, stolen credentials in cleartext, and intercepted Pix payment data. Attribution was established through WHOIS records revealing the operator's real name, CPF, and email address. The operation specifically targeted Northern Brazilian regional banks and credit cooperatives, with evidence of compromising a school fund account.

Pulse ID: 69de47aacc631b04e06bae89
Pulse Link: https://otx.alienvault.com/pulse/69de47aacc631b04e06bae89
Pulse Author: AlienVault
Created: 2026-04-14 13:56:58

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Bank #Brazil #Chrome #ChromeExtension #Cloud #CyberSecurity #Email #Endpoint #InfoSec #Mac #OTX #OpenThreatExchange #RAT #RCE #SocialEngineering #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
EchoTab : Gestionnaire d’onglets Chrome simple et performant

📌 EchoTab est une extension Chrome open-source qui permet de gérer ses onglets avec une interface clavier-first, tagging en masse et recherche instantanée. 100% local, aucune donnée envoyée à des s…

Clement MONDARY
Be careful! The Claude Chrome Extension has a vulnerability that allows zero-click prompt injection, posing a major threat to AI assistant security and data access. It's time to rethink our digital safety measures. Stay informed, stay safe! #CyberSecurity #AI #ChromeExtension #DataPrivacy
https://www.squaredtech.co/claude-chrome-extension-vulnerability-zero-click?fsp_sid=7355
Jaw-Dropping Claude Chrome Extension Vulnerability Exposes Zero Click AI Hijack Risk

Claude Chrome extension vulnerability allowed zero click prompt injection, raising serious concerns about AI assistant security and data access.

SquaredTech

GlassWorm attack installs fake browser extension for surveillance

GlassWorm is a sophisticated malware targeting developers through compromised code repositories and package managers. It executes in stages, starting with a stealthy infection that fingerprints the machine and fetches further payloads via the Solana blockchain. The malware steals sensitive data, including cryptocurrency wallets and development credentials, installs a Remote Access Trojan (RAT), and deploys a fake Chrome extension for extensive surveillance. It uses distributed hash tables and blockchain for resilient command and control. While initially focused on developers with potential cryptocurrency assets, the stolen information could enable wider supply chain attacks. Prevention strategies include careful package management, regular extension audits, and up-to-date anti-malware solutions.

Pulse ID: 69c59ad1d050c7b6a823051e
Pulse Link: https://otx.alienvault.com/pulse/69c59ad1d050c7b6a823051e
Pulse Author: AlienVault
Created: 2026-03-26 20:45:05

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BlockChain #Browser #Chrome #ChromeExtension #CyberSecurity #FakeBrowser #InfoSec #Mac #Malware #OTX #OpenThreatExchange #RAT #RemoteAccessTrojan #SupplyChain #Trojan #Worm #bot #cryptocurrency #developers #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

📰 適用されていないCSSを検出するChrome拡張を作った (👍 55)

🇬🇧 Chrome extension that detects ineffective CSS properties (width on inline elements, z-index without position, etc.) to save debugging time.
🇰🇷 인라인 요소의 width, position 없는 z-index 등 효과 없는 CSS 속성을 감지하는 Chrome 확장 프로그램을 제작했습니다.

🔗 https://zenn.dev/purupurupu/articles/css-noop-checker

#CSS #ChromeExtension #DevTools #Zenn

適用されていないCSSを検出するChrome拡張を作った

Zenn
How To Redesign Every Web Page You're On (Or: How a Bazooka Subwoofer Inspired My Browser Extension) | HackerNoon

Polish - a web extenstion that lets you style every web page, powered by AI