Watch out for LinkedIn fakes who want to get connected
Despite continued warnings of deepfake chaos during major events, things haven’t worked out the way some thought. Those video deepfakes...
Despite continued warnings of deepfake chaos during major events, things haven’t worked out the way some thought. Those video deepfakes...
Cybersecurity firm Sophos warned that the recently addressed CVE-2022-1040 flaw in Sophos Firewall is actively exploited in attacks. Sophos has recently fixed...
Threat actors have stolen approximately $625 million worth of Ethereum and USDC tokens from Axie Infinity ‘s Ronin network bridge....
One of the recent trends we’ve observed is the rise of cloud-based cryptocurrency-mining groups that exploit cloud resources, specifically the...
Learn more about cloud-based cryptomining, its repercussions, and how CISOs can create an effective risk mitigation strategy for this threat....
This blog post was authored by Hossein Jazi. Several threat actors have taken advantage of the war in Ukraine to...
Threat actors compromised WordPress sites to deploy a script that was used to launch DDoS attacks, when they are visited,...
Since the start of the Russian invasion of Ukraine, the war on the battlefield has been accompanied by cyber attacks....
People up to no good get themselves caught in an endless number of ways. This has always been the case...
In the context of this article we will use the term satellite for a machine that is launched into space...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added Chrome and Redis flaws to its Known Exploited Vulnerabilities Catalog. The...
This post explains what is a credential stuffing attack and which are the countermeasures to prevent them. A credential stuffing...
Ukrtelecom, a major mobile service and internet provider in Ukraine, foiled a “massive” cyberattack that hit its infrastructure. On March...
The Anonymous collective hacked the Russian construction company Rostproekt and announced that a leak that will Blow Russia Away. Anonymous...
A fundamental challenge of architecture built using tools like Terraform is configuration drift. Check out these actionable strategies and steps...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The Hive ransomware gang ported its encryptor to the Rust programming language and implemented new features. The Hive ransomware operation...
In 2017, a former NSA contractor named Reality Winner was arrested for allegedly leaking an internal report to the online...
The Muhstik botnet has been observed targeting Redis servers exploiting the recently disclosed CVE-2022-0543 vulnerability. Muhstik is a botnet that is...
Google has urged its 3 billion+ users to update to Chrome version 99.0.4844.84 for Mac, Windows, and Linux to mitigate a...
The FBI’s Internet Crime Complaint Center (IC3) has released its annual report. In 2021, IC3 continued to receive a record...
While Twitter suspends some Anonymous accounts, the collective hacked All-Russia State Television and Radio Broadcasting Company (VGTRK). On Friday, Anonymous...
Last week on Malwarebytes Labs: Anti-war open-source software developer targets Russians and Belarussians with “protestware”Elden Ring exploit traps players in...
Ukraine CERT-UA warns that the Belarus-linked GhostWriter APT group is targeting state entities of Ukraine with Cobalt Strike Beacon. Ukraine...