FakeSG enters the ‘FakeUpdates’ arena to deliver NetSupport RAT
Over 5 years ago, we began tracking a new campaign that we called FakeUpdates (also known as SocGholish) that used...
Over 5 years ago, we began tracking a new campaign that we called FakeUpdates (also known as SocGholish) that used...
This article is based on research by Marcelo Rivero, Malwarebytes' ransomware specialist, who monitors information published by ransomware gangs on...
Like all social media platforms, Facebook constantly has to deal with fake accounts, scams and malware. We have written about scams...
This article is based on research by Marcelo Rivero, Malwarebytes' ransomware specialist, who monitors information published by ransomware gangs on...
We often think of malvertising as being malicious ads that push malware or scams, and quite rightly so these are...
Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware called WikiLoader...
Data Security Posture Management is an approach to securing cloud data by ensuring that sensitive data always has the correct...
A nation-state actor with links to China is suspected of being behind a series of attacks against industrial organizations in...
Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to fully take over Facebook business...
The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in Russia and...
Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of an...
Security researchers have uncovered an ongoing attack campaign dubbed STARK#MULE, which employs US military-related documents as lures to deliver malware...
A Chinese threat actor that compromised federal networks by targeting Barracuda security appliances did so in part thanks to a...
Against a backdrop of global cybersecurity workforce gap of 3.4 million people, the White House today announced its new National...
The Android spyware known as SpyNote has been targeting financial institutions since late 2022 while expanding its capabilities to carry...
The UK’s Ministry of Defence (MoD) has launched its Secure by Design initiative, which is to transform how cybersecurity is...
Cybersecurity researchers have uncovered crucial insights into the tactics, techniques and procedures (TTPs) employed by the threat actor APT31 (also known...
Website of Israel's largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have...
Hackers are using a fake Android app named 'SafeChat' to infect devices with spyware malware that steals call logs, texts,...
Canon is warning users of home, office, and large format inkjet printers that their Wi-Fi connection settings stored in the...
Threat actors are actively targeting exposed instances of SSH and Redis Redis open-source data store with a peer-to-peer self-replicating worm...
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in...
Hackers are actively exploiting a 'BleedingPipe' remote code execution vulnerability in Minecraft mods to run malicious commands on servers and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infooliva_expertise -- oliva_expertise_eks Improper Neutralization of Special Elements used in an SQL...