Chinese hackers attacked a Russian developer of military submarines
Chinese hackers reportedly attacked the Rubin Central Design Bureau for Marine Engineering (СKB Rubin), which designs submarines for the Russian...
Chinese hackers reportedly attacked the Rubin Central Design Bureau for Marine Engineering (СKB Rubin), which designs submarines for the Russian...
As per a Bloomberg News story, at least $2 million of a cryptocurrency conspiracy was recently tossed from investors of...
After security researchers discovered a flaw in the Pega Infinity enterprise software platform, users are being advised to upgrade their...
Apple and Epic are now embroiled in a legal dispute, and as a result, some shocking material has surfaced on...
Court documents revealed that the infamous XcodeGhost malware, which has been active since 2015, infected 128 million iOS users. Documents provided in...
Google has released a new open-source tool called cosign that could allow administrators to sign and verify the container images....
The FBI and Australian Australian Cyber Security Centre (ACSC) warn of an ongoing Avaddon ransomware campaign targeting organizations worldwide. The...
The U.S. FBI confirmed that the attack against the Colonial Pipeline over the weekend was launched by the Darkside ransomware...
Summary: A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba...
Summary: A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s):...
Summary: A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s):...
Summary: AppUse 4.0 allows shell command injection via a proxy field. Reference Links(if available): https://gist.github.com/shiham101/4807e3dea54ee0f0456c47fcd1400e97 CVSS Score (if available) v2:...
Summary: An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. There is a double free in merge_sort::merge()....
This week on Lock and Code, we speak to cybersecurity and privacy attorney Jake Bernstein about ransomware attacks that don’t...
UPDATE 10:47 AM Pacific Time, May 10: At 8:55 AM Pacific Time, the FBI confirmed that Colonial Pipeline was attacked...
Last week on Malwarebytes Labs, we discussed how Spectre attacks have come back from the dead; why Facebook banned Instragram...
Cybersecurity vendor Sophos has revealed how using a 'crack' version of a data visualization tool was the cause of a...
After the western agencies outed their techniques, Russian actors from the APT29 group responded to the expose by using a...
CaptureRx, a world-leading San Antonio-based Healthcare technology organization has recently witnessed a ransomware attack wherein hackers accessed the protected health...
Special security research published this week, states that unauthorized users might have been able to access confidential user information through...
The hackers who caused Colonial Pipeline to shut down the biggest US petrol pipeline last Friday began their blitz against...
News overview Q1 2021 saw the appearance of two new botnets. News broke in January of the FreakOut malware, which...
A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors...
CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network...