Watch out for this SMS phish promising a tax refund
Imagine logging into your bank’s website after responding to a text message claiming you’re due a refund, only to see...
Imagine logging into your bank’s website after responding to a text message claiming you’re due a refund, only to see...
State television announced that Iran has foiled massive cyberattacks that targeted public services operated by both government and private organizations....
Less than one year ago, the worst ransomware attack in history struck dozens of organizations. Threat actors had exploited a...
Apple will soon be rolling out its promised child safety features in the Messages app for users in Australia, Canada,...
Running a small- to medium-sized business (SMB) requires expertise in everything, from marketing and sales to management and hiring, but...
Last week on Malwarebytes Labs: Why you shouldn’t automate your VirusTotal uploadsNorth Korean Lazarus APT group targets blockchain tech companiesWatch out...
At least 60 entities worldwide have been breached by BlackCat ransomware, warns a flash report published by the U.S. FBI....
The number of zero-day vulnerabilities exploited in cyberattacks in the wild exploded in the last years, security firm report. Google...
Atlassian fixed a critical flaw in its Jira software, tracked as CVE-2022-0540, that could be exploited to bypass authentication. Atlassian...
OpRussia continues unabated, since declaring ‘cyber war’ on Russia Anonymous has now published approximately 5.8 TB of Russian data. The...
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective....
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Telecommunication giant T-Mobile confirmed the LAPSUS$ extortion group gained access to its networks in March. Telecom company T-Mobile on Friday revealed that...
A researcher has released proof-of-concept (PoC) code for a digital signature bypass vulnerability in Java. Security researcher Khaled Nassar released...
Ukraine CERT-UA warns of phishing attacks on state organizations of Ukraine using the topic “Azovstal” and Cobalt Strike Beacon. The...
Conti ransomware gang claimed responsibility for a ransomware attack that hit the government infrastructure of Costa Rica. Last week a...
Learn the impacts of cryptomining attacks for DevOps as well as mitigation strategies to bolster security without impacting time to...
When security fails, cyber insurance can become crucial for ensuring continuity. Cyber has changed everything around us – even the...
Experts disclose an unpatched vulnerability in the RainLoop webmail client, tracked as CVE-2022-29360, that can be exploited to steal users’...
Taiwanese vendor QNAP warns users to update their NAS Firmware to fix Apache HTTP flaws addressed in the Apache HTTP...
Which hat hackers that participated in the Pwn2Own Miami 2022 hacking contest earned a total of $400,000 for their ICS...
The Lemon_Duck cryptomining botnet is targeting Docker servers to mine cryptocurrency on Linux systems. Crowdstrikes researchers reported that the Lemon_Duck cryptomining botnet...
A critical RCE flaw in Android devices running on Qualcomm and MediaTek chipsets could allow access to users’ media files....
“When we found the No. 10 case, my jaw dropped.” John Scott-Railton recalled after finding out on July 7, 2020...