500,000 Huawei Devices hit by the Joker Malware
Security researchers have discovered that over 500,000 Huawei smartphone users who inadvertently subscribe to premium mobile services have downloaded apps...
Security researchers have discovered that over 500,000 Huawei smartphone users who inadvertently subscribe to premium mobile services have downloaded apps...
In recent weeks, a relatively sophisticated new malware downloader has emerged that, while not widely distributed yet, appears to be...
APKPure, one of the biggest alternative application stores outside of the Google Play Store, was tainted with malware this week,...
While analyzing the CVE-2021-1732 exploit originally discovered by the DBAPPSecurity Threat Intelligence Center and used by the BITTER APT group,...
The exploit code for a remote code execution vulnerability affecting QNAP network-attached storage (NAS) devices that run the Surveillance Station...
Security experts disclosed nine flaws, collectively tracked as NAME:WRECK, affecting implementations of the DNS protocol in popular TCP/IP network communication...
An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based...
Pulse Secure VPN users were not able to login due to the expiration of a code signing certificate used to...
President Joe Biden has appointed two former senior NSA officials for two prominent cyber roles in his administration. President Joe...
Many of us who read the news daily encounter a regular drum beat of ransomware stories that are both worrying...
An Italian citizen’s apparent attempt to hire a hitman on the Dark Web has been undone by clever analysis of...
Google revealed last month that it is rolling out the Federated Learning of Cohorts (FLoC) program, an important part of...
On Sunday 11th of April, just hours after newly developed centrifuges, which could enrich uranium faster were launched in Iran,...
Microsoft released as open-source the ‘CyberBattleSim Python-based toolkit which is an Enterprise Environment Simulator. Microsoft has recently announced the open-source...
LinkedIn has formally denied that the recently disclosed data leak was caused by a security breach, data were obtained via...
Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
Fake banking apps laced with malware remain a crucial factor in the success of threat actors. For the Yanbian gang,...
Belden has uncovered that extra information was accessed and copied during their November 2020 cyberattack related to employees' medical care...
Audio-only app Clubhouse gained huge success over the last few months and now attackers are misusing the reputation and fame...
On Saturday 13 March, Bitcoin, the world's largest cryptocurrency, had gone up again, touching an all-time milestone. As per Coin...
The REvil Ransomware is unstoppable when it comes to ingenious hacking tactics and techniques. The well-known ransomware has escalated its...
On Sunday, an “accident” occurred in the electricity distribution network at Iran’s Natanz nuclear facility, experts speculate it was caused...
An SQL database containing the personal data of 1.3 million Clubhouse users was leaked online for free, a few days...