Discord scammers go CryptoBatz phishing
It’s not been a great couple of weeks for people looking to get in on NFTs. Missing apes, rug-pulls, it’s all go in...
It’s not been a great couple of weeks for people looking to get in on NFTs. Missing apes, rug-pulls, it’s all go in...
Threat actors are actively exploiting a critical flaw (CVE-2021-20038) in SonicWall’s Secure Mobile Access (SMA) gateways addressed in December. Threat...
A new version of the BRATA malware implements a functionality to perform a factory reset of the device to wipe...
In the early 2000’s, the Segway company released a personal transporter that would become iconic. The Segway Human Transporter was...
The maintainers of the Rust programming language fixed a high-severity flaw that could allow attackers to delete files and directories...
We investigated the most recent activities of APT36, also known as Earth Karkaddan, a politically motivated advanced persistent threat (APT)...
LockBit ransomware's operators announced the release of its first Linux and ESXi variant in October. With samples also spotted in...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Threat actors planted a backdoor into multiple WordPress themes and plugins after compromising the website of their developer. In a...
Back in October 2021, Microsoft announced in an email sent to customers that it planned to disable Excel 4.0 macros...
Avid readers of the Malwarebytes Labs blog are quite aware of QR code shenanigans—both within and outside of the United...
There’s been trouble brewing over the weekend for players of the smash-hit Dark Souls series. PvP servers (player vs player)...
Russian authorities arrested four alleged members of the international cyber theft ring tracked as ‘Infraud Organization.’ In February 2008, the...
Experts warn Emotet malware campaign using “unconventional” IP address formats in an attempt to evade detection. Threat actors behind a...
Last week on Malwarebytes Labs: CISA calls for urgent action against critical threatsRed Cross begs attackers to “Do the right...
The FBI warns that cybercriminals are using malicious QR codes to steal their credentials and financial info. The Federal Bureau of...
Cybersecurity provider F5 released security patches to address 25 vulnerabilities affecting its BIG-IP, BIG-IQ, and NGINX products. Cybersecurity firm F5...
OpenSubtitles has suffered a data breach, the maintainers confirmed that the incident impacted 7 Million subscribers. OpenSubtitles is a popular...
US CISA added seventeen new actively exploited vulnerabilities to the ‘Known Exploited Vulnerabilities Catalog’. The ‘Known Exploited Vulnerabilities Catalog‘ is...
Cyberespionage group Molerats has been observed abusing legitimate cloud services, like Google Drive and Dropbox as attack infrastructure. Zscaler ThreatLabz...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Not all data privacy rights are the same. There’s the flimsy, the firm, the enforceable, and the antiquated, and, unfortunately,...
The Dutch National Cybersecurity Centre (NCSC) warns organizations of risks associated with cyberattacks exploiting the Log4J vulnerability. The Dutch National...
Two critical security vulnerabilities in Control Web Panel potentially expose Linux servers to remote code execution attacks Researchers from Octagon Networks disclosed...