Flaws in Zimbra could allow to takeover webmail server of a targeted organization
Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious...
Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious...
It must not be easy to work at Kaseya right now. While they are working as hard as they can...
Before the work week ended last week Friday, a security researcher found a leak of what is claimed to be...
The officials of Mobile County in southwest Alabama, have finally notified county employees of a computer system breach that compromised...
Q2 2021 was among the most important ransomware periods, with several significant events taking place. Humans witnessed one of the...
According to WhatsApp CEO Will Cathcart, governments used NSO group malware to target high-ranking government officials all around the world. Cathcart...
On a hacking forum, a threat actor has begun selling the confidential database of Clubhouse, which contains 3.8 billion phone...
Transnet SOC Ltd, a large South African rail, port and pipeline company, announced it was hit by a disruptive cyber attack. South Africa’s logistics company...
Experts found three new zero-day flaws in the Kaseya Unitrends service and warn users to avoid exposing the service to...
The Babuk ransomware operators seem to have suffered a ransomware attack, threat actors flooded their forum gay orgy porn images....
Apple released a security update that addresses CVE-2021-30807 flaw in macOS and iOS that may have been actively exploited to...
The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for...
Last week, Check Point Research described a new Mac variant of malware they call XLoader. It was identified as being...
Last week on Malwarebytes Labs: Stopransomware(dot)gov, a one-stop hub for ransomware resourcesBeware, crypto-scammer seeks foreigner with BLOCK CHAIN ACCOUNTRemcos RAT...
The director of the company IT-Reserve Pavel Myasoedov spoke about how to protect yourself from surveillance using photographs.Standards that allow...
Cybersecurity firm Netskope published the fifth edition of its Cloud and Threat Report that covers the cloud data risks, menaces,...
GitHub has released a number of supply chain security updates for Go programming language modules.In a blog post published on...
Intezer has discovered new Kubernetes cluster attack vectors using misconfigured instances of Argo Workflows. Threat actors have already been benefitted...
Researchers demonstrated how to hide malware inside an image classifier within a neural network in order to bypass the defense...
Microsoft published mitigations for the recently discovered PetitPotam attack that allows attackers to force remote Windows machines to share their...
A threat actor is offering for sale on hacking forums the secret database Clubhouse containing 3.8B phone numbers. Clubhouse is...
Uber infringed on the privacy of more than 1 million Australians in 2016, according to the Office of the Australian...
Experts warn that scammers have begun to hack the accounts of citizens on the site of state services and using...
Popular cross-chain liquidity exchange THORChain has been hit by another exploit, this time costing around $8 million, suffering a second...