EU condemns Russian cyber operations against Ukraine
The European Union condemns the cyberattacks conducted by Russia against Ukraine, which targeted the satellite KA-SAT network. The European Union...
The European Union condemns the cyberattacks conducted by Russia against Ukraine, which targeted the satellite KA-SAT network. The European Union...
How Trend Micro’s unified cybersecurity platform is transforming cloud security If you like the site, please consider joining the telegram...
We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics. If you like the site, please...
On April 26th, we identified a suspicious email that targeted a government official from Jordan’s foreign ministry. The email contained...
Microsoft disclosed a now-fixed vulnerability in Azure Synapse and Azure Data Factory that could have allowed remote code execution. Microsoft...
On May 11, 2022, the EU will publicize a proposal for a law on mandatory chat control. The European Commission...
Jester Stealer, a malicious file capable of large amounts of data theft, is on the prowl again. The Ukrainian Computer...
Hacktivists yesterday defaced the Russian TV with pro-Ukraine messages and took down the RuTube video streaming site. Hacktivists and white...
Threat actors are exploiting critical F5 BIG-IP flaw CVE-2022-1388 to deliver malicious code, cybersecurity researchers warn. Threat actors started massively exploiting...
The Resecurity HUNTER unit identified a new underground service called ‘Frappo’, which is available on the Dark Web. “Frappo” acts...
Researchers warn of a remote access trojan called DCRat (aka DarkCrystal RAT) that is available for sale on Russian cybercrime...
It’s not been plain sailing recently for Conti ransomware, the Ransomware as a Service (RaaS) group with several major attacks...
The Australian Cyber Security Centre (ACSC) has announced it is aware of the existence of Proof of Concept (PoC) code...
Earlier this year, many members of the public were introduced to the facets of a long-ignored crime in cyberspace: The...
Swearing off a company used to be easier. Rude customer service, an unfortunate bout of food poisoning, even standing up...
The Computer Emergency Response Team of Ukraine (CERT-UA) warns of attacks spreading info-stealing malware Jester Stealer. The Computer Emergency Response...
The German Sparkasse bank has launched a browser that is especially designed to do your online banking. The browser called...
A friend of mine recently received a text message which they described as “intriguing, but nonsensical”. They were convinced it...
The Open Source Security Foundation (OpenSSF), a collective of industry leaders aimed at improving the security of open-source software (OSS),...
Last week on Malwarebytes Labs: Google, Apple, and Microsoft step hand in hand into a passwordless futureOpenSea warns of Discord...
A few days after F5 addressed the critical CVE-2022-1388 Remote Code execution flaw in its BIG-IP products, researchers created exploits...
China-linked Mustang Panda APT group targets entities in Asia, the European Union, Russia, and the US in a new wave of...
Conti Ransomware gang claims to have hacked the Peru MOF – Dirección General de Inteligencia (DIGIMIN) and stolen 9.41 GB....
This post provides a timeline of the events related to Russia invasion of Ukraine from the cyber security perspective. Below...