Twitter removes 100 accounts linked to Russia disseminating disinformation
Twitter removed dozens of accounts allegedly used by Russia-linked threat actors to disseminate disinformation and target western countries. Twitter has...
Twitter removed dozens of accounts allegedly used by Russia-linked threat actors to disseminate disinformation and target western countries. Twitter has...
IBM has released security patches to address high- and medium-severity vulnerabilities impacting some of its enterprise solutions. IBM has released...
Ransomware peddlers have come up with yet another devious twist on the recent trend for data exfiltration. After interviewing several...
Cyber security company Red Canary published findings last week about a new piece of Mac malware called Silver Sparrow. This...
The former developer of the Android version of the application of the Russian social network VKontakte Grigory Klyushnikov created Clubhouse...
Malwarebytes, an American security firm announced the findings of its annual ‘State of Malware’ report, this report explored the working...
With more mobile apps entering the new world of smartphone users, only a few know about the dangers of the...
A Chinese hacking group allegedly "cloned" and deployed a zero-day exploit created by the U.S. National Security Agency's Equation Group...
FireEye experts linked a series of attacks targeting Accellion File Transfer Appliance (FTA) servers to the cybercrime group UNC2546, aka...
Daycare camera product NurseryCam was hacked last week, the company was forced to shut down its IoT camera service. On...
Ukraine ‘s government accused unnamed Russian traffic networks as the source of massive attacks on Ukrainian security and defense websites....
The systems of Georgetown County have been hacked at the end of January, and the county staff is still working...
Last week on Malwarebytes Labs, the spotlight fell on the State of Malware 2021 report, wherein we have seen cyberthreats...
Threat actors are using a novel approach to steal the credit card details of e-commerce shoppers by exploiting Google’s Apps...
The Federal Bureau of Investigation (FBI) jointly with the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the...
Today’s security teams are facing more complexity than ever before. IT environments are changing and expanding rapidly, resulting in proliferating...
The Chinese APT group had access to an NSA Equation Group, NSA hacking tool and used it years before it...
An attacker demonstrated this week that Clubhouse chats are not secure, he was able to siphon audio feeds from “multiple...
Researchers spotted a new Office malware builder, tracked as APOMacroSploit, that was employed in a campaign targeting more than 80...
Experts warn of threat actors using Google Alerts to promote a fake Adobe Flash Player updater that delivers unwanted programs....
A white hat hacker has earned a $5,000 reward from Apple for reporting a stored cross-site scripting (XSS) vulnerability on...
The administrator behind Joker's Stash professes to have formally closed down the operation on 15th February. Meanwhile, criminal gangs offering...
This year, many government agencies will have to spend several hundred million rubles on updating their information systems due to...
Lakehead University (LU) based in Ontario; Canada is currently dealing with the cyber-attack that hit the institution on Tuesday; Consequently,...