This New Malware Hides Itself Among Windows Defender Exclusions to Avoid Detection
On Tuesday, security experts confirmed the existence of a previously undocumented malware strain named "MosaicLoader," which targets people looking for...
On Tuesday, security experts confirmed the existence of a previously undocumented malware strain named "MosaicLoader," which targets people looking for...
A new hacking gang TA2721 also commonly known as Caliente Bandits has been tracked by Proofpoint researchers since January 2021....
NSO Group, an Israeli cyber intelligence firm, developed Pegasus spyware as a surveillance tool. As claimed by the corporation, this...
Download full report (PDF) As cyberattacks become more sophisticated, and security solutions require more resources to analyze the huge amount...
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and...
A US federal judge sentenced Russian hacker Peter Levashov to 33 months, time served, and three years of supervised release...
Experts discovered a Local Privilege Escalation, tracked as CVE-2021-33909, that could allow attackers to get root access on most Linux...
Experts warn of a 16-year-old vulnerability (CVE-2021-3438) in an HP, Xerox, and Samsung printers driver that an attacker could exploit...
Do you remember back when the latest urgent update was a vulnerability in Microsoft Exchange? How is that only four...
Over the past couple of years, modern technology has been actively implemented in medicine. AI helps to assess the degree...
According to recent research, the Wi-Fi network name issue that entirely disabled an iPhone's network connectivity had remote code execution...
Ecuador's state-run Corporación Nacional de Telecomunicación (CNT) suffered a massive ransomware attack causing havoc in the business operations, the payment...
The Department of Commerce restricts trade with four Russian IT and cybersecurity companies together with two additional entities, based on...
Fortinet fixes a serious bug in its FortiManager and FortiAnalyzer network management solutions that could be exploited to execute arbitrary...
Microsoft has seized 17 malicious homoglyph domains used by crooks in a business email compromise (BEC) campaign targeting its users. Microsoft’s Digital...
A recently discovered iPhone Wi-Fi bug that could crash the WiFi connectivity could be exploited by attackers to achieve remote...
US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and...
Cisco Talos experts disclose details of several critical flaws in a router monitoring application developed by industrial and IoT firm...
This blog post was authored by Erika Noerenberg Introduction Over the past months, Malwarebytes researchers have been tracking a unique...
We’ve observed a 419-style scam (also known as an advance fee scam) which combines the promise of cryptocurrency riches with...
The US Department of Homeland Security (DHS) and the US Department of Justice (DOJ)—along with other federal partners—have launched a...
Last week on Malwarebytes Labs: DNS-over-HTTPS takes another small step towards global dominationNope, that isn’t Elon Musk, and he isn’t...
Juniper Networks' Steel-Belted Radius (SBR) Carrier Edition has a severe remote code-execution vulnerability that leaves wireless carrier and fixed operator...
Experts believe that screenshots of work correspondence sent by company employees to third parties may fall into the hands of...