A week in security (February 14 – February 20)
Last week on Malwarebytes Labs: Adobe patches actively exploited Magento/Adobe Commerce zero-dayRansomware gang hits 49ers’ network before Super Bowl kick...
Last week on Malwarebytes Labs: Adobe patches actively exploited Magento/Adobe Commerce zero-dayRansomware gang hits 49ers’ network before Super Bowl kick...
Researchers discovered a flaw in the encryption algorithm used by Hive ransomware that allowed them to decrypt data. Researchers discovered...
The Threat Report Portugal: Q4 2021 compiles data collected on the malicious campaigns that occurred from July to September, Q4,...
The FBI warned US organizations and individuals are being increasingly targeted in BECattacks on virtual meeting platforms The Federal Bureau...
Threat actors have stolen and flipped high-valued NFTs from the users of the world’s largest NFT exchange, OpenSea. The world’s...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The Conti ransomware group takes over TrickBot malware operation and plans to replace it with BazarBackdoor malware. TrickBot operation has...
LinkedIn is sometimes forgotten about in more general coverage of phishing attacks. Social media sites such as Facebook, Twitter, and...
US Senators Richard Blumenthal of Connecticut and Marsha Blackburn of Tennessee have introduced the Kids Online Safety Act (KOSA), legislation...
The U.S. CISA has created a list of free cybersecurity tools and services that can help organizations increase their resilience....
The White House has linked the recent DDoS attacks against Ukraine ‘s banks and defense agencies to Russia’s GRU. The...
WordPress forces the update of the UpdraftPlus plugin patch on 3 million sites to fix a high-severity vulnerability. WordPress has...
SMS PVA services' use of infected Android phones reveals flaws in SMS verification, and 'Russian state-sponsored cyber actors' cited in...
Google introduces Privacy Sandbox on Android aimed at leading to more private advertising solutions for mobile users. Google announced Privacy...
Iran-linked TunnelVision APT group is actively exploiting the Log4j vulnerability to deploy ransomware on unpatched VMware Horizon servers. Researchers from SentinelOne...
Qualys experts found a new Linux privilege escalation vulnerability, tracked as CVE-2021-44731, in Canonical’s Snap Package Manager. Canonical’s Snap software packaging and deployment...
Researchers developed an exploit code for CVE-2022-24086 vulnerability affecting Adobe Commerce and Magento Open Source. Positive Technologies researchers have created a working...
Attackers compromise Microsoft Teams accounts to attach malicious executables to chat and spread them to participants in the conversation. While...
Mozilla has issued a warning about the upcoming versions 100 for both Chrome and Firefox. The change in the version...
Cisco warns of a DoS issue affecting its Email Security Appliance (ESA) product that could be exploited using specially crafted...
The European Data Protection Supervisor authority called for a ban on the development and the use of Pegasus-like commercial spyware....
Researchers spotted a new Golang-based botnet called Kraken that is under active development and supports a lot of backdoor capabilities. Kraken is...
The International Committee of the Red Cross (ICRC) said attackers that breached its network last month exploited a Zoho bug....
Discover the six pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles...