VPN Android apps: What you should know
Months ago, we told readers about the importance of using a VPN on their iPhones, and while those lessons do...
Months ago, we told readers about the importance of using a VPN on their iPhones, and while those lessons do...
According to BleepingComputer, the operators behind the Zeppelin ransomware-as-a-service (RaaS), aka Buran, have resumed operations following a brief outage. Zeppelin's...
Security experts at London-based blockchain analytics firm Elliptic discovered the bitcoin wallet used by the ransomware group responsible for the...
The six-day shutdown of a key 5,550-mile fuel pipeline earlier this month as a result of a malware attack proved...
Inexpensive intelligent connectors are a big threat to cybersecurity and can effectively be used by cybercriminals to hack anyone’s device...
According to reports and tweets, DeFi100, a cryptocurrency project, allegedly defrauded investors out of $32 million (roughly Rs. 233 crores)....
Introduction Over the past few years, the ransomware threat landscape has been gradually changing. We have been witness to a...
Researchers disclosed details about 13 vulnerabilities in the Nagios network monitoring application that could be exploited for malicious purposes. Cybersecurity...
A misconfiguration issue in the software used by the Eufy video camera exposed private information and video streams of customers....
Last week on Malwarebytes Labs, we looked at a banking trojan full of nasty tricks, explained some tips and pointers...
This week on Lock and Code, we speak to cybersecurity advocate and author Carey Parker about “dark patterns,” which are...
The National Cyber Security Centre of Ireland (NCSC) believes that the attack on the country's Health Service Executive (HSE) was...
An FBI employee with a top-secret security clearance has been indicted on charges that she illegally stored several national security...
The famous Pizza company Dominos suffered a data leak again this year wherein the details of 18 crore orders are...
In 2019, Apple aimed to reassure its customers when it revealed in a blog post that it had fixed a...
According to the Federal Bureau of Investigation, the same group of online extortionists responsible for last week's attack on the...
The wormable CVE-2021-31166 vulnerability in the HTTP Protocol Stack of the Windows IIS server also affects WinRM on Windows 10...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The Alaska health department website was forced offline by a malware attack, officials are investigating the incident. The website of...
QNAP warns customers of updating the HBS 3 disaster recovery app to prevent Qlocker ransomware attack. Taiwanese vendor QNAP is...
Mercari, an e-commerce platform, has disclosed a major data breach that occurred as a result of the Codecov supply-chain attack....
A massive cyberattack was perpetrated against the domestic carrier Air India, which compromised passengers' data including passports, contacts, ticket information,...
During testimony defending Apple in a lawsuit with Fortnite developer Epic Games, a top Apple executive said that Mac malware...
FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. A...