A week in security (January 4 – January 10)
Last week on Malwarebytes Labs, we released survey results about VPN usage and found that 36 percent of our respondents...
Last week on Malwarebytes Labs, we released survey results about VPN usage and found that 36 percent of our respondents...
JetBrains a software company based in the Czech Republic could possibly be used as a doorway by Russian hackers to...
Phishing emails are scams where the actors try to befool the user by sending emails that may concern the user....
Launched in 2018, Parler has become a place of refuge for individuals that have been prohibited or suspended by popular...
Introduction On December 13, 2020, FireEye published a blog post detailing a supply chain attack leveraging Orion IT, an infrastructure...
A pre-boot execution environment for Apple boards built on top of checkra1n.Building on macOSInstall Xcode + command-line utilities make clean...
Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.Notice:Why is the project...
A U.S. court on Thursday sentenced the Russian hacker Andrei Tyurin to 12 years in prison for his role in...
Researchers obtained gained access to the Git Repositories belonging to the United Nations, exposing staff records and credentials. The research...
The source code for the ChastityLock ransomware that was used in attacks aimed at the users of the Qiui Cellmate...
Security expert Stefan Umit Uygur, CEO and Co-Founder at 4Securitas Ltd, provided his vision about the Cyber-defence solutions on the...
In the current scenario credential theft malware is one of the most frequently employed malware in cyber hacking. Many government...
Cybersecurity and Infrastructure Security Agency (CISA) informed that perpetrators of SolarWinds attack obtained confidential information via common hacker techniques like...
Reserve Bank of India has forewarned Indians against unauthorized money lending apps that are increasingly rising day by day, consequently...
On Thursday, the Cybersecurity and Infrastructure Security Agency (CISA) asked clients of Mozilla Foundation's Firefox browser and Windows, macOS, and...
This tool can be used to visualize the MUD files in JSON format. MotivationMUD files are plain text files in...
PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team...
A cyber attack hit the New Zealand central bank, sensitive information has been potentially accessed by the intruders The New...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Researchers from Trend Micro discovered that the TeamTNT botnet is now able to steal Docker API logins along with AWS...
Dassault Falcon Jet has disclosed a data breach that exposed personal information belonging to current and former employees. In December...
As per the cybersecurity experts, the cyberattacks are related to Earth Wendigo, a cyber criminal currently not linked to any...
The Federal Court of the Southern District of New York sentenced Russian Andrey Tyurin to 12 years in prison for...
The threat Intelligence arm of Check Point Software Technologies Ltd., a world-leading cybersecurity solutions provider has recently published its...