<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Malicious Extensions on BriefArc</title><link>https://briefarc.com/tags/malicious-extensions/</link><description>Recent content in Malicious Extensions on BriefArc</description><image><title>BriefArc</title><url>https://briefarc.com/images/og-cover.png</url><link>https://briefarc.com/images/og-cover.png</link></image><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 03 May 2026 18:30:47 +0000</lastBuildDate><atom:link href="https://briefarc.com/tags/malicious-extensions/index.xml" rel="self" type="application/rss+xml"/><item><title>How Productivity Chrome Extensions Are Becoming Hacker Tools: What to Do</title><link>https://briefarc.com/posts/how-productivity-chrome-extensions-are-becoming-hacker-tools-what-to-do/</link><pubDate>Sun, 03 May 2026 18:30:47 +0000</pubDate><guid>https://briefarc.com/posts/how-productivity-chrome-extensions-are-becoming-hacker-tools-what-to-do/</guid><description>Cybercriminals are increasingly targeting popular productivity Chrome extensions to steal data and compromise accounts. This article explains how these attacks work, how to spot dangerous extensions, and what you can do to protect yourself and your organization.</description></item></channel></rss>