Denonia cryptominer is first malware to target AWS Lambda
Security researchers at Cado Security, a cybersecurity forensics company, recently discovered the first publicly-known malware targeting Lambda, the serverless computing...
Security researchers at Cado Security, a cybersecurity forensics company, recently discovered the first publicly-known malware targeting Lambda, the serverless computing...
Starting very soon, old and outdated apps on the Google Play Store will no longer be available to download. A...
A credential-stealing Windows-based malware, Spyware.FFDroider, is after social media credentials and cookies, according to researchers at ThreatLabz. The version analyzed...
Last week on Malwarebytes Labs: Why data protection and privacy are not the same, and why that matters: Lock and...
Microsoft announced a feature called Autopatch that will allow organizations to keep their systems up-to-date starting with Windows Enterprise E3 (July 2022)....
Dependency Review GitHub Action scans users’ pull requests for dependency changes and will raise an error if any new dependencies...
Easy Appointments contained a very dangerous Broken Access Control vulnerability tracked as CVE-2022-0482 that was exposing PII. Another day, another...
There’s a mistake commonly made in the United States that a law that was passed to help people move their...
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective....
NB65 hacking group created its ransomware based on the leaked source code of the Conti ransomware and targets Russia. According...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Facebook/Meta said Russia-linked threat actors are attempting to use the social network against Ukraine with hate speech, bullying, and fake...
A massive DDoS attack took down Finnish government websites while Ukrainian President Zelenskyy addressed Finland’s members of parliament (MPs). On...
Experts discovered malicious Android apps on the Google Play Store masqueraded as antivirus solutions spreading the SharkBot Trojan. Researchers from the...
China-linked threat actors continue to target Indian power grid organizations, most of the attacks involved the ShadowPad backdoor. Recorded Future’s...
Experts warn of a Mirai-based botnet exploiting the recently discovered Spring4Shell vulnerability in attacks in the wild. Trend Micro Threat...
We discovered active exploitation of a vulnerability in the Spring Framework designated as CVE-2022-22965 that allows malicious actors to download...
This year’s MITRE Engenuity™ ATT&CK Evaluation simulates techniques associated with notorious threat groups Wizard Spider and Sandworm to test solutions'...
Which are the most important cybersecurity measures that businesses can take to protect themselves in the cloud era? We are...
Some of the biggest stars around have seen content placed on their YouTube accounts without permission over the last couple...
The popular hacking Anonymous and the IT ARMY of Ukraine continue to target Russian government entities and private businesses. This...
The US Department of Justice (DoJ) and Microsoft have taken the sting out of two operations believed to be controlled...
Ledger is one of the biggest hardware cryptocurrency wallets around and scammers have noticed. Phishing mails are in circulation, hoping...
A Ukrainian man was sentenced in the US to 5 years in prison for his criminal activity in the cybercrime...