<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: chidambaram</title>
    <description>The latest articles on DEV Community by chidambaram (@chidambaram_07).</description>
    <link>https://dev.to/chidambaram_07</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3849938%2Fa117b318-2b15-4140-8bde-877388dbd32a.jpg</url>
      <title>DEV Community: chidambaram</title>
      <link>https://dev.to/chidambaram_07</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/chidambaram_07"/>
    <language>en</language>
    <item>
      <title>PhishClean Affiliate Program</title>
      <dc:creator>chidambaram</dc:creator>
      <pubDate>Mon, 06 Apr 2026 18:21:16 +0000</pubDate>
      <link>https://dev.to/chidambaram_07/phishclean-affiliate-program-5a18</link>
      <guid>https://dev.to/chidambaram_07/phishclean-affiliate-program-5a18</guid>
      <description>&lt;p&gt;We just launched the PhishClean Affiliate Program.&lt;/p&gt;

&lt;p&gt;If you create content around cybersecurity, phishing prevention, privacy, secure browsing, or developer security, you can now partner with us and earn 30% recurring commission on approved referrals.&lt;/p&gt;

&lt;p&gt;PhishClean is a privacy-first browser security product that helps users detect:&lt;br&gt;
phishing pages&lt;br&gt;
suspicious login flows&lt;br&gt;
JWT and token leaks&lt;br&gt;
exposed API keys and secrets&lt;br&gt;
hidden iframes&lt;br&gt;
risky redirects and other browser-level threats&lt;/p&gt;

&lt;p&gt;What makes PhishClean different is that detection runs locally in the browser.&lt;/p&gt;

&lt;p&gt;We do not upload passwords or page content for detection.&lt;/p&gt;

&lt;p&gt;We’re looking to work with:&lt;br&gt;
cybersecurity bloggers&lt;br&gt;
newsletter writers&lt;br&gt;
YouTubers&lt;br&gt;
technical educators&lt;br&gt;
privacy-focused creators&lt;br&gt;
developer-focused affiliates&lt;/p&gt;

&lt;p&gt;Apply here:&lt;br&gt;
&lt;a href="https://www.phishclean.com/affiliate" rel="noopener noreferrer"&gt;https://www.phishclean.com/affiliate&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sass</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>affiliate</category>
    </item>
    <item>
      <title>PhishClean now has an MCP server!</title>
      <dc:creator>chidambaram</dc:creator>
      <pubDate>Fri, 03 Apr 2026 11:49:34 +0000</pubDate>
      <link>https://dev.to/chidambaram_07/phishclean-now-has-an-mcp-server-2h9h</link>
      <guid>https://dev.to/chidambaram_07/phishclean-now-has-an-mcp-server-2h9h</guid>
      <description>&lt;p&gt;🚨 Claude Code just leaked 512,000 lines of source code. And it revealed something interesting — their entire agentic system runs on MCP.&lt;/p&gt;

&lt;p&gt;MCP (Model Context Protocol) is how AI agents like Claude connect to external tools and APIs.&lt;/p&gt;

&lt;p&gt;Which means if you're building security tools in 2026, MCP compatibility isn't optional anymore — it's expected.&lt;/p&gt;

&lt;p&gt;That's why I built phishclean-mcp 🛡️&lt;/p&gt;

&lt;p&gt;PhishClean's MCP server lets you run security checks directly inside:&lt;br&gt;
✅ Claude Desktop&lt;br&gt;
✅ Claude Code&lt;br&gt;
✅ Gemini CLI&lt;br&gt;
✅ Any MCP-compatible client&lt;/p&gt;

&lt;p&gt;What it can do right from your AI chat: 🔗 Scan URLs for phishing 🔑 Detect leaked API keys &amp;amp; secrets 📄 Audit JWT tokens 📧 Analyze email headers 🔍 Check password strength 🕵️ Detect backlink impersonation&lt;br&gt;
One command to install:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;npm i phishclean-mcp&lt;/code&gt;&lt;br&gt;
&lt;code&gt;npx phishclean-mcp&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;No cloud lookups. No data sent anywhere. Everything runs locally. 🔒&lt;br&gt;
If you're using Claude Code or Claude Desktop — try it and let me know what you think 👇&lt;/p&gt;

&lt;p&gt;🔗&lt;a href="https://www.npmjs.com/package/phishclean-mcp?activeTab=readme" rel="noopener noreferrer"&gt;https://www.npmjs.com/package/phishclean-mcp?activeTab=readme&lt;/a&gt;&lt;br&gt;
🌐phishclean.com&lt;/p&gt;

&lt;h1&gt;
  
  
  ClaudeCode #MCP #CyberSecurity #PhishClean #AITools #DevTools #Privacy
&lt;/h1&gt;

</description>
      <category>webdev</category>
      <category>cybersecurity</category>
      <category>api</category>
      <category>mcp</category>
    </item>
    <item>
      <title>🚀 PhishClean v1.1.3 is here — faster, sharper, and more vigilant than ever.</title>
      <dc:creator>chidambaram</dc:creator>
      <pubDate>Thu, 02 Apr 2026 16:14:40 +0000</pubDate>
      <link>https://dev.to/chidambaram_07/phishclean-v113-is-here-faster-sharper-and-more-vigilant-than-ever-4gkj</link>
      <guid>https://dev.to/chidambaram_07/phishclean-v113-is-here-faster-sharper-and-more-vigilant-than-ever-4gkj</guid>
      <description>&lt;p&gt;We’ve just pushed a new update to our Chrome extension, and it’s currently under review on the Chrome Web Store. Here’s what’s new in v1.1.3 👇&lt;/p&gt;

&lt;p&gt;🔍 Enhanced Detection Engine&lt;br&gt;
Smarter identification of suspicious URLs with improved accuracy and reduced false positives.&lt;/p&gt;

&lt;p&gt;⚡ Performance Boosts&lt;br&gt;
Faster scanning and lighter footprint — protection that doesn’t slow you down.&lt;/p&gt;

&lt;p&gt;🛡️ Improved Web Navigation Monitoring&lt;br&gt;
Better real-time tracking of navigation and redirects to catch phishing attempts earlier.&lt;/p&gt;

&lt;p&gt;🔧 Stability &amp;amp; Bug Fixes&lt;br&gt;
Quietly fixing the cracks so your browsing stays smooth and secure.&lt;/p&gt;

&lt;p&gt;💡 Our mission remains simple:&lt;br&gt;
Make safe browsing effortless.&lt;br&gt;
PhishClean works silently in the background, analyzing links before they become threats — so you don’t have to think twice before clicking.&lt;/p&gt;

&lt;p&gt;📦 Version 1.1.3 is rolling out soon. Stay tuned.&lt;br&gt;
If you're building products, platforms, or tools where user safety matters — we’re also working on something bigger 👀 (API coming soon).&lt;/p&gt;

&lt;h1&gt;
  
  
  CyberSecurity #Phishing #ChromeExtension #Startup #BuildInPublic #PhishClean
&lt;/h1&gt;

</description>
      <category>cybersecurity</category>
      <category>extensions</category>
      <category>privacy</category>
      <category>phishing</category>
    </item>
    <item>
      <title>5 Scariest Cybersecurity Attacks of March 2026 — And How to Protect Yourself</title>
      <dc:creator>chidambaram</dc:creator>
      <pubDate>Sun, 29 Mar 2026 19:14:27 +0000</pubDate>
      <link>https://dev.to/chidambaram_07/5-scariest-cybersecurity-attacks-of-march-2026-and-how-to-protect-yourself-25pn</link>
      <guid>https://dev.to/chidambaram_07/5-scariest-cybersecurity-attacks-of-march-2026-and-how-to-protect-yourself-25pn</guid>
      <description>&lt;p&gt;March 2026 has been one of the most alarming months in recent cybersecurity history. Nation-state wiper attacks, phishing-as-a-service platforms, supply chain backdoors, and fake banking apps — attackers are hitting harder, faster, and smarter than ever.&lt;br&gt;
Here's a breakdown of the five biggest attacks this month — and what you can do right now to protect yourself.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Stryker Corporation — Iran-Linked Wiper Attack&lt;/strong&gt;&lt;br&gt;
On March 11, 2026, Stryker Corporation — one of the world's largest medical device companies serving over 150 million patients across 61 countries — was hit by an Iran-linked wiper attack that forced tens of thousands of employees offline, causing global operational disruption.&lt;br&gt;
This wasn't ransomware. There was no ransom demand. The goal was pure destruction — permanently erasing data with no recovery possible.&lt;/p&gt;

&lt;p&gt;What makes this terrifying: Wiper attacks paired with phishing lures are a growing tactic. Unit 42 identified 7,381 conflict-themed phishing URLs across 1,881 unique hostnames Palo Alto Networks being used to lure victims — mimicking telecom providers, airlines, and law enforcement.&lt;br&gt;
How PhishClean helps: PhishClean's domain mismatch detection and link safety tooltips flag suspicious URLs before you click them — catching phishing lures that precede these attacks at the browser layer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Tycoon 2FA — Phishing-as-a-Service Takedown&lt;/strong&gt;&lt;br&gt;
In a major coordinated disruption on March 4, 2026, Tycoon 2FA — a prolific adversary-in-the-middle phishing-as-a-service platform — was disrupted by Proofpoint, Microsoft, Europol, Cloudflare, and international law enforcement, resulting in the seizure of 330 control panel domains. &lt;br&gt;
Hornetsecurity&lt;br&gt;
In February 2026 alone, over three million phishing messages were tied to Tycoon 2FA campaigns, targeting organizations across virtually every major vertical — including schools, hospitals, and government institutions. Hornetsecurity&lt;br&gt;
The platform worked by harvesting Microsoft 365 and Gmail session cookies through a transparent proxy — bypassing MFA entirely.&lt;br&gt;
What makes this terrifying: Even with 2FA enabled, attackers could steal your session cookie and log in as you. No password needed.&lt;/p&gt;

&lt;p&gt;How PhishClean helps: PhishClean's JWT token leak detection and auth header monitoring detect when session tokens are being exposed or sent to third-party domains — catching exactly the kind of cookie harvesting Tycoon 2FA relied on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. LiteLLM Supply Chain Attack — Backdoored Python Package&lt;/strong&gt;&lt;br&gt;
Versions 1.82.7 and 1.82.8 of LiteLLM — a popular AI proxy with 95 million monthly downloads — were found to contain malicious payloads that harvested AWS keys, Git credentials, and crypto wallets silently on startup. The malware self-replicated in Kubernetes environments and exfiltrated data to a fake domain.&lt;br&gt;
PyPI pulled both versions. Safe version: 1.82.6.&lt;br&gt;
What makes this terrifying: You install a trusted package and your AWS keys are gone within seconds — no interaction required.&lt;/p&gt;

&lt;p&gt;How PhishClean helps: While supply chain attacks happen at the package level, PhishClean's secret leak scanner detects when AWS keys, Stripe keys, and other credentials are exposed in browser-visible content — giving you an extra layer of defense if compromised keys surface in dashboards or web UIs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Fake IndusInd Bank App — Mobile Phishing&lt;/strong&gt;&lt;br&gt;
A sophisticated malware dropper was spotted mimicking the IndusInd Bank app, targeting Android users in a phishing scheme aimed at stealing sensitive financial information. Once installed, the malicious app displayed a fake banking interface, tricking users into entering mobile numbers, Aadhaar numbers, PAN numbers, and net banking credentials — sending the data to both a phishing server and a Telegram-controlled C2 channel. Cyber Security News&lt;br&gt;
What makes this terrifying: The fake app looked identical to the real one. Most users had no idea they were on a phishing page.&lt;/p&gt;

&lt;p&gt;How PhishClean helps: PhishClean's backlink impersonation detection flags pages that borrow legitimate brand assets — logos, policy links, support links — to appear trustworthy. This is exactly the technique fake banking apps use in their web-based phishing flows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. OAuth Redirect Abuse — Trust Hijacking via Microsoft &amp;amp; Google&lt;/strong&gt;&lt;br&gt;
Microsoft's security team reported attackers abusing legitimate OAuth redirect behavior to move users from trusted Microsoft or Google login URLs to phishing pages. The first domain the victim sees is completely legitimate — the danger comes in the redirect chain that follows.&lt;br&gt;
What makes this terrifying: Your browser shows a real Microsoft URL. You trust it. Then you're silently moved to a phishing page before you notice.&lt;/p&gt;

&lt;p&gt;How PhishClean helps: PhishClean analyzes where forms actually submit data — not just where the page says it's from. Even if the visible URL looks legitimate, PhishClean catches domain mismatches between what's displayed and where your credentials actually go.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Common Thread Across All 5 Attacks&lt;/strong&gt;&lt;br&gt;
Every single one of these attacks exploits browser-layer trust:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A URL that looks legitimate&lt;br&gt;
A page that looks identical to the real thing&lt;br&gt;
Credentials submitted to the wrong server&lt;br&gt;
Tokens and keys exposed without your knowledge&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is exactly the layer &lt;strong&gt;PhishClean&lt;/strong&gt; was built to protect.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fln0r2v6y6zjnsyyhjbz9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fln0r2v6y6zjnsyyhjbz9.png" alt=" " width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What Is &lt;strong&gt;PhishClean&lt;/strong&gt;?&lt;br&gt;
&lt;strong&gt;PhishClean is a free browser extension that runs 15 detection signals entirely on your device — no cloud lookups, no data sent anywhere. It catches:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;✅ Phishing pages before you submit your credentials&lt;br&gt;
✅ Exposed API keys and secrets in page source&lt;br&gt;
✅ JWT token leaks in URLs&lt;br&gt;
✅ Hidden iframes stealing credentials&lt;br&gt;
✅ HTTPS downgrades on public WiFi&lt;br&gt;
✅ Suspicious domain mismatches&lt;br&gt;
✅ Auth headers sent to wrong servers&lt;/p&gt;

&lt;p&gt;Available free on Chrome, Firefox, and Edge.&lt;br&gt;
👉 Install PhishClean — &lt;a href="https://www.phishclean.com" rel="noopener noreferrer"&gt;https://www.phishclean.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What You Should Do Right Now&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Install a browser security extension — PhishClean catches threats that no blocklist has seen yet&lt;br&gt;
Use a password manager — it won't autofill on fake domains&lt;br&gt;
Enable 2FA everywhere — but use an authenticator app, not SMS&lt;br&gt;
Never click login links in emails — type the URL directly&lt;br&gt;
Rotate credentials if you used LiteLLM 1.82.7 or 1.82.8&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The attacks of March 2026 are a reminder that the browser is the most overlooked security risk in everyday life. One click is all it takes.&lt;/p&gt;

&lt;p&gt;This article was written by the PhishClean Research Team. PhishClean is a privacy-first browser security extension available at phishclean.com.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>phishing</category>
      <category>privacy</category>
      <category>saas</category>
    </item>
  </channel>
</rss>
