Threat actors target poorly protected Microsoft SQL Server installs
Threat actors install Cobalt Strike beacons on vulnerable Microsoft SQL Servers to achieve a foothold in the target network. Researchers...
Threat actors install Cobalt Strike beacons on vulnerable Microsoft SQL Servers to achieve a foothold in the target network. Researchers...
Besides the name of the creature that “stars” in the Alien movies by 20th Century Fox, Xenomorph is also the...
US cookware distributor giant Meyer Corporation discloses a data breach that affected thousands of its employees. Meyer Corporation, the second-largest...
The Ukrainian police arrested a gang specialized in the sale of stolen payment card data through phishing attacks. The cybercrime...
China-linked APT group APT10 (aka Stone Panda, Bronze Riverside) targets Taiwan’s financial trading sector with a supply chain attack. The...
American worldwide logistics and freight forwarding company Expeditors International shuts down global operations after cyber attack American logistics and freight forwarding company Expeditors International...
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Figures...
Xenomorph Android trojan has been observed distributed via the official Google Play Store targeting 56 European banks. Researchers from ThreatFabric...
A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Crooks abuse some SMS PVA services that allow their customers to create disposable user accounts to conduct malicious activities. While...
Malicious actors use influence operations, like spreading false information, to shape public opinion, undermine trust, amplify division, and create dissension....
Ken Paxton, the Attorney General of Texas, recently filed a lawsuit against Facebook’s parent company, Meta, for harvesting the facial...
Last week on Malwarebytes Labs: Adobe patches actively exploited Magento/Adobe Commerce zero-dayRansomware gang hits 49ers’ network before Super Bowl kick...
Researchers discovered a flaw in the encryption algorithm used by Hive ransomware that allowed them to decrypt data. Researchers discovered...
The Threat Report Portugal: Q4 2021 compiles data collected on the malicious campaigns that occurred from July to September, Q4,...
The FBI warned US organizations and individuals are being increasingly targeted in BECattacks on virtual meeting platforms The Federal Bureau...
Threat actors have stolen and flipped high-valued NFTs from the users of the world’s largest NFT exchange, OpenSea. The world’s...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The Conti ransomware group takes over TrickBot malware operation and plans to replace it with BazarBackdoor malware. TrickBot operation has...
LinkedIn is sometimes forgotten about in more general coverage of phishing attacks. Social media sites such as Facebook, Twitter, and...
US Senators Richard Blumenthal of Connecticut and Marsha Blackburn of Tennessee have introduced the Kids Online Safety Act (KOSA), legislation...
The U.S. CISA has created a list of free cybersecurity tools and services that can help organizations increase their resilience....
The White House has linked the recent DDoS attacks against Ukraine ‘s banks and defense agencies to Russia’s GRU. The...