COVID-19 vaccine appointment system attacked in Italy
In another cyberattack on a healthcare system, threat-actors have tried to throw a wrench into the ongoing COVID-19 vaccine roll-out...
In another cyberattack on a healthcare system, threat-actors have tried to throw a wrench into the ongoing COVID-19 vaccine roll-out...
According to new research, a threat actor believed to be of Chinese origin was linked to a series of ten...
Microsoft recently announced that WAF (Web Application Firewall) bot safety tool has attained general availability status on Azure Application Gateway...
The FBI and SEC have come with new guidance for investors to fight against financial scams. Users are being suggested...
Microsoft's Security Intelligence staff has issued an alert to Office 365 users and administrators to watch out for a sneaky...
Thailand's new vaccination appointment registration website, expatvac.consular.go.th, has received mixed reviews since its launch. Many people reported that they had a...
China-linked APT31 group employed a new strain of malware in attacks aimed at entities in Mongolia, Belarus, Canada, the US,...
INFRA:HALT is a set of vulnerabilities affecting a popular TCP/IP library commonly OT devices manufactured by more than 200 vendors....
Cyber Defense Magazine August 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 148 pages of...
China linked APT groups have targeted networks of at least five major telecommunications companies operating in Southeast Asia since 2017....
Zoom has agreed to an $85m settlement regarding privacy, zoom-bombing, and data sharing. The class action privacy lawsuit filed in...
Having antivirus (AV) software on your computer is a staple. Modern antivirus offers layered protection—a cybersecurity approach that uses multiple...
While you read these words, the chances are that somebody, somewhere, is trying to break in to your computer by...
The representatives of the company Positive Technologies reported that the hacker group APT31, known for its attacks on state structures...
Recently, ransomware hacking groups have been mostly focusing on Microsoft Windows OS. McAfee researched dedicated Linux and Unix based ransomware,...
Some days back Google has announced that the company is about to launch its Google Play ‘Safety Section’ feature that...
Security researchers at RandoriSec have identified numerous critical and high-severity flaws in IP camera firmware made by UDP Technology, a...
In mid-July, a new phishing attack was detected that used a compromised mailing service account. In the four days between...
Cisco addressed a vulnerability in the Firepower Device Manager (FDM) On-Box software that allows attackers to execute arbitrary code on...
A flaw in the GitHub Actions workflow for PyPI ’s source repository could be exploited to potentially execute arbitrary code...
Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related...
Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper, that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from...
Last week on Malwarebytes Labs: OSX.XLoader hides little except its main purpose: What we learned in the installation process.The Clubhouse...
Critical Security Exploit in the popular e learning platform Moodle can be compromised that lets access to student data and...