Indian Origin Woman Rewarded with Rs 22 Lakh Bounty by Microsoft
Aditi Singh, a 20-year-old Delhi-based ethical hacker, was awarded $30,000 (Rs 22 lakh roughly) for detecting a bug in the...
Aditi Singh, a 20-year-old Delhi-based ethical hacker, was awarded $30,000 (Rs 22 lakh roughly) for detecting a bug in the...
A massive breach has purportedly compromised the data of over 700 million LinkedIn users. LinkedIn has a total of 756...
Deputy Secretary of the Security Council of the Russian Federation Oleg Khramov named several countries with which Moscow plans to...
Earlier this month, Microsoft signed a driver called Netfilter that turned out to be a malicious network filter rootkit. Krasten...
The pandemic and the restrictions that came with it have led to an increase in the popularity of dating apps....
The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware...
Researchers analyzed a recently discovered threat, the Lorenz ransomware, and developed a free decryptor for the victims of this new...
Code repository hosting service GitHub announced that it has paid out more than $1.5 million through its bug bounty program since...
Binance, the world’s largest and most popular cryptocurrency exchange network, has had a rough few days. First, Japan’s financial regulator,...
In layman’s terms, a VPN uses encryption to create a private online connection between a device and a VPN server....
This blog post was authored by Jérôme Segura A very common practice among criminals consists of mimicking legitimate infrastructure when...
We’ve been warning about advergaming—the combination of virtual reality (VR) and ads—for years on the Labs Blog. I’ve given a...
São Paulo-based medical diagnostic firm Grupo Fleury has suffered a ransomware attack that has impaired business operations after the company...
Zyxel, a manufacturer of enterprise routers and VPN devices, has issued a notification that attackers are targeting its devices and...
Catching threats is tricky business, especially in today’s threat landscape. To tackle this problem, for many years сybersecurity researchers have...
Microsoft is investigating an strange attack, threat actor used a driver signed by the company, the Netfilter Driver, to implant...
The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their own ransomware...
Researchers discovered six rogue packages in the official Python programming language’s PyPI repository containg cryptocurrency mining malware. Experts from security firm Sonatype have...
Last week on Malwarebytes Labs: Want to stop ransomware attacks? Send the cybercriminals to jail, says Brian Honan: Lock and...
On Wednesday 23rd of June, cyber-security experts uncovered key vulnerabilities in the Atlassian project and software development platform that might...
The whole goal of using a network-attached storage device is to have a hard drive where you can back up...
Avast researchers published a report on Thursday regarding the discovery of a cryptocurrency mining malware that abuses Windows Safe mode...
On 16 April 2021, security researcher Jeremiah Fowler together with the Website Planet Research Team revealed a non-password secured database...
Researchers have uncovered a variant of cryptocurrency-mining malware that exploits Windows Safe Mode during attacks. Researchers at Avast have termed the...