Why we fail at getting the cybersecurity basics right, with Jess Dodson: Lock and Code S02E21
The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by...
The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by...
The healthcare industry might be known for the work it does to treat patients. But it is also a prime...
Operation Cyclone – Six alleged affiliates with the Clop ransomware operation were arrested in an international joint law enforcement operation...
Last week on Malwarebytes Labs Celebrity jewelry house Graff falls victim to ransomwareLessons from a real-life ransomware attackIs Apple’s Safari...
Experts warn of an ongoing hacking campaign that already compromised at least nine organizations worldwide from critical sectors by exploiting...
A Hungarian government official confirmed that his government has bought and used the controversial NSO Group’s Pegasus spyware. Lajos Kosa,...
The FBI warns of an increase of fraudulent schemes leveraging cryptocurrency ATMs and QR Codes to facilitate payment. The FBI...
Threat actors are impersonating cybersecurity firm Proofpoint to trick victims into providing Microsoft Office 365 and Gmail credentials. Cybercriminals are...
A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The FBI issued a private industry notification (PIN) to warn of ransomware attacks that hit several tribal-owned casinos last year....
DeFi platforms are a privileged target for crooks, threat actors have stolen $55 million from bZx DeFi platform. Threat actors...
The Philips Tasy EMR comprehensive healthcare informatics solution is affected by two critical SQL injection vulnerabilities. The Philips Tasy EMR...
The Zero Day Initiative’s Pwn2Own Austin 2021 hacking contest has ended, and participants earned $1,081,250 for 61 zero-day flaws. Trend...
US officials believe that a drone was employed in an attempted attack on a power substation in Pennsylvania last year. US...
US defense contractor Electronic Warfare Associates (EWA) was hit by a cyber attack, threat actors stole personal information from its...
Ukraine’s premier law enforcement and counterintelligence revealed the real identities of five FSB members behind the Gamaredon cyberespionage group. Ukraine’s...
The US State Department is offering a massive $10 million reward if you can help bring DarkSide to justice. The...
A new threat actor is exploiting ProxyShell flaws in attacks aimed at Microsoft Exchange servers to deploy the Babuk Ransomware...
Two popular npm libraries, coa and rc., have been hijacked, threat actors replaced them with versions laced with password-stealing malware. The security...
The US government offers up to a $10,000,000 reward for information leading to the identification or arrest of DarkSide gang...
CISA urges vendors to address BrakTooth flaws after researchers have released public exploit code and a proof of concept tool...
The Cybersecurity and Infrastructure Security Agency (CISA) has issued binding directive 22-01 titled Reducing the Significant Risk of Known Exploited...
Cisco fixed critical flaws that could have allowed unauthenticated attackers to access its devices with hard-coded credentials or default SSH...