Hackers have turned the RedTiger toolkit into a data-stealing weapon. This post breaks down the threat and the steps to keep your PC safe.
The vulnerability works on Google Chrome and all web browsers that run on Chromium, which includes Microsoft Edge, Brave, ...
It allows any Chromium browser to collapse in 15-60 seconds by exploiting an architectural flaw in how certain DOM operations ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results