BleepingComputer’s most popular cybersecurity stories of 2022
It was a big year for cybersecurity in 2022 with massive cyberattacks and data breaches, innovative phishing attacks, privacy concerns,...
It was a big year for cybersecurity in 2022 with massive cyberattacks and data breaches, innovative phishing attacks, privacy concerns,...
In early August, the Malwarebytes Threat Intelligence team identified a new attack targeting government entities in Sri Lanka. The threat...
While Google Chrome still dominates as the top browser, Microsoft Edge, which is based on the Chromium source code, is gradually gaining...
Malwarebytes Threat Intelligence builds a monthly picture of ransomware activity by monitoring the information published by ransomware gangs on their...
Malwarebytes Threat Intelligence builds a monthly picture of ransomware activity by monitoring the information published by ransomware gangs on their...
In recent years, tech support scammers have become very familiar with the mechanics of malvertising to generate large amounts of...
Online advertising is a multi billion dollar industry with projected spending to reach over 600 billion U.S. dollars for 2022. It's not...
Many websites owners often ask themselves why criminals are putting malware on their WordPress instance. It doesn't always make sense, especially when...
Malwarebytes Threat Intelligence builds a monthly picture of ransomware activity by monitoring the information published by ransomware gangs on their...
Black Friday is the annual kick off to the shopping season for brick and mortar and online retailers. However, it's...
PyTorch has identified a malicious dependency with the same name as the framework's 'torchtriton' library. This has led to a successful compromise via the dependency...
The ALPHV ransomware operators have gotten creative with their extortion tactic and, in at least one case, created a replica...
The LockBit ransomware gang has released a free decryptor for the Hospital for Sick Children (SickKids), saying one of its...
An cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day has been claimed...
A previously unknown Linux malware has been exploiting 30 vulnerabilities in multiple outdated WordPress plugins and themes to inject malicious JavaScript. According to...
The Canadian Copper Mountain Mining Corporation (CMMC) in British Columbia has announced that it was the target of a ransomware attack...
Netgear has fixed a high-severity vulnerability affecting multiple WiFi router models and advised customers to update their devices to the...
A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely...
An anonymous Twitter user published yesterday a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform....
A group of imposters operating out of a Ukrainian call center defrauded thousands of victims while pretending to be IT security...
Explore use cases and mitigation strategies to improve software supply chain security and reduce cyber risk. If you like the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The Royal Ransomware gang claimed responsibility for a cyber attack against telecommunications company Intrado on Tuesday. While Intrado is yet...
Malware operators have been increasingly abusing the Google Ads platform to spread malware to unsuspecting users searching for popular software products....