Ostral Security

Use cases

Menu

Contact

Contact

Stories

Stories

FAQ

FAQ

Login

Login

Ostral Security

Main Pages
Use cases
Resources

Ostral Security

Login

Login

Main Pages
Use cases
Resources

Recent posts

Tales from Our Journey

How "Free" VPNs Exposed 8 Million Users' AI Secrets

Security researchers have uncovered a massive privacy breach in which trusted "free" VPNs and browser extensions secretly harvested the sensitive AI conversations of over 8 million users.

Read article

How "Free" VPNs Exposed 8 Million Users' AI Secrets

Security researchers have uncovered a massive privacy breach in which trusted "free" VPNs and browser extensions secretly harvested the sensitive AI conversations of over 8 million users.

Read article

Recent posts

Latest from us

Trojan Horse Extensions: How "Zoom Stealer" Spied on Millions of Corporate Meetings

A new espionage campaign known as "Zoom Stealer" has compromised over 2 million browsers by using popular, functional extensions to secretly scrape sensitive data from professional meetings on Zoom, Teams, and Google Meet.

Read article

Trojan Horse Extensions: How "Zoom Stealer" Spied on Millions of Corporate Meetings

A new espionage campaign known as "Zoom Stealer" has compromised over 2 million browsers by using popular, functional extensions to secretly scrape sensitive data from professional meetings on Zoom, Teams, and Google Meet.

Read article

The Second Coming: How "Shai-Hulud 2.0" Unleashed a New Worm on the Developer Ecosystem

The "Shai-Hulud 2.0" supply chain attack has compromised over 25,000 GitHub repositories by using a worm-like malware that evades detection via the Bun runtime and hides stolen data within public GitHub repositories.

Read article

The Second Coming: How "Shai-Hulud 2.0" Unleashed a New Worm on the Developer Ecosystem

The "Shai-Hulud 2.0" supply chain attack has compromised over 25,000 GitHub repositories by using a worm-like malware that evades detection via the Bun runtime and hides stolen data within public GitHub repositories.

Read article

Take back control of your web browser

Request a demo

Request a demo

Be the first to hear about our new features

Your information is never disclosed to third parties.

Main pages

Homepage

Offer

Pricing

Use cases

Extension Security

Authentication

Shadow IT/SaaS - Coming soon

Zero-Day Phishing - Coming soon

Resources

Stories

FAQ

Security at Ostral

Privacy Policy

Ostral 2025, All Rights Reserved

Take back control of your web browser

Request a demo

Request a demo

Be the first to hear about our new features

Your information is never disclosed to third parties.

Main pages

Homepage

Offer

Pricing

Use cases

Extension Security

Authentication

Shadow IT/SaaS - Coming soon

Zero-Day Phishing - Coming soon

Resources

Stories

FAQ

Security at Ostral

Privacy Policy

Ostral 2025, All Rights Reserved

Take back control of your web browser

Request a demo

Request a demo

Be the first to hear about our new features

Your information is never disclosed to third parties.

Main pages

Homepage

Offer

Pricing

Use cases

Extension Security

Authentication

Shadow IT/SaaS - Coming soon

Zero-Day Phishing - Coming soon

Resources

Stories

FAQ

Security at Ostral

Privacy Policy

Ostral 2025, All Rights Reserved

Take back control of your web browser

Request a demo

Request a demo

Be the first to hear about our new features

Your information is never disclosed to third parties.

Main pages

Homepage

Offer

Pricing

Use cases

Extension Security

Authentication

Shadow IT/SaaS - Coming soon

Zero-Day Phishing - Coming soon

Resources

Stories

FAQ

Security at Ostral

Privacy Policy

Ostral 2025, All Rights Reserved