Financial cyberthreats in 2021
The year 2021 was eventful in terms of digital threats for organizations and individuals, and financial institutions were no exception....
The year 2021 was eventful in terms of digital threats for organizations and individuals, and financial institutions were no exception....
UK and US cybersecurity agencies linked Cyclops Blink malware to Russia’s Sandworm APT US and UK cybersecurity and law enforcement...
Pangu Lab researchers disclosed details of the Bvp47 backdoor that was used by the US NSA Equation Group. Researchers from...
The code of the recently-emerged Entropy ransomware has similarities with the one of the infamous Dridex malware. The recently-emerged Entropy...
Experts found a nine-year-old unpatched flaw in the Horde Webmail software that could allow access to email accounts. A feature...
Iranian national media corporation, Islamic Republic of Iran Broadcasting (IRIB), was hit by a wiper malware in late January 2022....
In this three-part blog entry, our team explored SMS PVA, a service built on top of a global bot network...
Threat actors install Cobalt Strike beacons on vulnerable Microsoft SQL Servers to achieve a foothold in the target network. Researchers...
Besides the name of the creature that “stars” in the Alien movies by 20th Century Fox, Xenomorph is also the...
US cookware distributor giant Meyer Corporation discloses a data breach that affected thousands of its employees. Meyer Corporation, the second-largest...
The Ukrainian police arrested a gang specialized in the sale of stolen payment card data through phishing attacks. The cybercrime...
China-linked APT group APT10 (aka Stone Panda, Bronze Riverside) targets Taiwan’s financial trading sector with a supply chain attack. The...
American worldwide logistics and freight forwarding company Expeditors International shuts down global operations after cyber attack American logistics and freight forwarding company Expeditors International...
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Figures...
Xenomorph Android trojan has been observed distributed via the official Google Play Store targeting 56 European banks. Researchers from ThreatFabric...
A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Crooks abuse some SMS PVA services that allow their customers to create disposable user accounts to conduct malicious activities. While...
Malicious actors use influence operations, like spreading false information, to shape public opinion, undermine trust, amplify division, and create dissension....
Ken Paxton, the Attorney General of Texas, recently filed a lawsuit against Facebook’s parent company, Meta, for harvesting the facial...
Last week on Malwarebytes Labs: Adobe patches actively exploited Magento/Adobe Commerce zero-dayRansomware gang hits 49ers’ network before Super Bowl kick...
Researchers discovered a flaw in the encryption algorithm used by Hive ransomware that allowed them to decrypt data. Researchers discovered...
The Threat Report Portugal: Q4 2021 compiles data collected on the malicious campaigns that occurred from July to September, Q4,...
The FBI warned US organizations and individuals are being increasingly targeted in BECattacks on virtual meeting platforms The Federal Bureau...