Analysts “strongly believe” the Russian state colludes with ransomware gangs
“We have the smoke, the smell of gunpowder and a bullet casing. But we do not have the gun to...
“We have the smoke, the smell of gunpowder and a bullet casing. But we do not have the gun to...
A terrorist watchlist comprising 1.9 million data remained open and unsecured on the internet for three weeks between July 19th...
Part of the database of the forum and its owners is available free of charge, the hackers offered to purchase...
A new strain of malware called Chaos, which is still under active development has been discovered by the security experts....
In the first half of 2021, the Russian mobile games market was among the world's top five leaders in terms...
The "Sophos state of Ransomware in Retail 2021" report issued by the software and hardware giant Sophos recently, examines the...
BREAKING NEWS: LockBit Ransomware Tor Blog Offline. No further information at present 404-page error on the Ransomware Blog page When...
Fortinet addresses a command injection vulnerability that can allow attackers to take complete control of servers running vulnerable FortiWeb WAF...
A security researcher discovered that a secret FBI’s terrorist watchlist was accidentally exposed on the internet for three weeks between...
Colonial Pipeline discloses a data breach of the personal information of thousands of individuals after the ransomware attack that took...
T-Mobile confirms a breach after threat actors claimed to have obtained records of 100 million of its customers and offered...
The recent attacks that targeted Iran’s transport ministry and national train system were conducted by a threat actor dubbed Indra. In...
Nearly one year after the exclusive app Clubhouse launched on the iOS store, its popularity skyrocketed. The app, which is...
Sometimes it’s hard to figure out what exactly is going wrong with your computer. What do you do if you’ve...
Last week on Malwarebytes Labs: Home routers are being hijacked using a vulnerability disclosed just 2 beforeRansomware turncoat leaks Conti...
As part of multiple campaigns detected by cybersecurity firm SentinelOne, a new AdLoad malware strain is infecting Macs bypassing Apple's...
A vulnerability in Node.js that would permit a remote actor to carry out domain hijacking assaults has been patched. Last week,...
A spear-phishing attack that seems to have commenced in early July 2021, targeting various manufacturing industries in Asia has been...
A Cornell University Tech team with researchers discovered a new kind of backdoor attack that can modify natural-language modelling systems...
Threat actors are using the Malware-as-a-Service (MaaS) model to attack Windows users, according to researchers. The new info-stealer malware “Ficker”...
The US FINRA warns US brokerage firms and brokers of an ongoing phishing campaign impersonating its representatives to steal sensitive info. The...
T-Mobile is investigating a possible data breach after a threat actor published a post on a forum claiming to be...
A job ad published by the UK’s Ministry of Defence has revealed the existence of a previously undisclosed secret SAS...
According to a survey conducted by ESET, a company specializing in anti-virus software development and protection against cyberthreats, most Russians...