1CometJacking attack tricks Comet browser into stealing emails (opens in new tab)(bleepingcomputer.com)3bubblehack3r5mo ago0
2CometJacking: One Click Can Turn Perplexity's Comet AI Browser Against You (opens in new tab)(layerxsecurity.com)2bubblehack3r5mo ago0
4Base44 – build fully-functional apps in minutes with just your words (opens in new tab)(base44.com)2bubblehack3r8mo ago0
5A Guide to Bearer Tokens: JWT vs. Opaque Tokens (opens in new tab)(permit.io)19bubblehack3r11mo ago9
6Secrets.tools – scan any login page for secrets (opens in new tab)(secrets.tools)1bubblehack3r1y ago0
7New disruption of Finland-Germany cable reported in Baltic Sea (opens in new tab)(yle.fi)1bubblehack3r1y ago1
8Crypto exchange Bybit says it was hacked and lost around $1.4B (opens in new tab)(techcrunch.com)6bubblehack3r1y ago0
11Profile Image Intel – OSINT tool analyzing profile pictures (opens in new tab)(profileimageintel.com)2bubblehack3r1y ago0
12Leaked Timestamps in Chrome Extensions Could Track Users (opens in new tab)(fingerprint.com)1bubblehack3r1y ago1
13Exploiting leaked timestamps from Google Chrome extensions (opens in new tab)(fingerprint.com)15bubblehack3r1y ago1
15Friends don't let friends reuse nonces (opens in new tab)(blog.trailofbits.com)3bubblehack3r1y ago1