BigBasket: Data Breach Leaks 20 Million User Data
A threat actor dropped about 20 million Big Basket user reports containing personally identifiable details and hashed passwords on a...
A threat actor dropped about 20 million Big Basket user reports containing personally identifiable details and hashed passwords on a...
European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows...
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts...
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another...
Last week on Malwarebytes Labs, we interviewed Youssef Sammouda, a 21-year-old bug bounty hunter who is focused on finding vulnerabilities...
Experts cautioned that a text message scam infecting Android phones is expanding across the UK. The message, which appears to...
In this article, we’re going to deep dive into the role of Covalent, the unified blockchain API. So, the first...
A Russian hacking group claims to have obtained schematics for some yet-to-be-released Apple products. The hackers have demanded a $50...
A program that monitors and collects the Social Media posts of the American public even on issues related to planned...
Following a cyberattack on the corporate password manager Passwordstate, Click Studios, an Australian software house, has advised consumers to reset...
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
10,000+ unpatched ABUS Secvest home alarm systems could be remotely disabled exposing customers to intrusions and thefts. Researchers from Eye Security have...
The cybersecurity community has lost its star, the popular hacker Dan Kaminsky has passed away. The popular cyber security researcher...
ToxicEye is a new Remote Access Trojan (RAT) that exploits the Telegram service as part of it command and control...
Hackers reportedly gained access to blueprints of the latest Apple developments by attacking the servers of the Taiwanese company Quanta...
It appears that the developers of the ‘Sysrv’ botnet have been working hard in putting out a more sophisticated version...
Attackers distribute offers to install the "latest update" of the messenger disguised as official Facebook posts. Victims risk losing access...
The Telegram service is being exploited by operators of a new Remote Access Trojan (RAT) to keep control of their...
While Apple was working on the preparations for the 'Spring Loaded' event that went live on Tuesday, 20th April, the...
A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques....
On Sunday, Europol will end a three-month-long process of dismantling the Emotet botnet by triggering a time-activated .dll to delete...
The Cybersecurity and Infrastructure Security Agency (CISA) has reported finding the SUPERNOVA web shell collecting credentials on a SolarWinds Orion...
A written proposal to ban several uses of artificial intelligence (AI) and to place new oversight on other “high-risk” AI...