CDRThief Linux malware steals VoIP metadata from Linux softswitches
ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call...
ESET researchers discovered a new piece of malware dubbed CDRThief targets a specific Voice over IP system to steal call...
Bluetooth 4.0 through 5.0 versions are affected by the vulnerability dubbed BLURtooth which allows hackers to defeat Bluetooth encryption. A...
Slovak cryptocurrency exchange ETERBASE disclosed a security breach, hackers stole cryptocurrency funds worth $5.4 million. Slovak cryptocurrency exchange ETERBASE disclosed...
...a simple, self-contained modular host-based IOC scannerSpyre is a simple host-based IOC scanner built around the YARA pattern matching engine...
Safety checks your installed dependencies for known security vulnerabilities.By default it uses the open Python vulnerability database Safety DB, but...
In this blog post, we are going to talk about a couple of older, lesser-known features that can still provide...
Malvertising campaigns leading to exploit kits are nowhere near as common these days. Indeed, a number of threat actors have...
According to Qrator Labs, a company specializing in ensuring the availability of Internet resources and countering DDoS attacks, Russia has...
The malware Joker was yet again caught making rounds on Playstore - Cybersecurity firm Pradeo identified at least six applications...
For the most up-to-date information on Anchore Engine, Anchore CLI, and other Anchore software, please refer to the Anchore DocumentationThe...
Review Access - kubectl plugin to show an access matrix for server resourcesIntroHave you ever wondered what access rights you...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
This blog will discuss the ruthless battle for computing power among the different cryptocurrency-mining malware that target Linux systems. We...
This month’s update includes 129 updates for the Microsoft Office suite, with 15 specifically addressing SharePoint vulnerabilities. If you like...
We’ve talked about Purple Fox malware being delivered by the Rig exploit kit. Other researchers later found evidence that it...
Malicious actors continue to target environments running Docker containers. We recently encountered an attack that drops both a malicious cryptocurrency...
This week, learn about Trend Micro’s midyear roundup report which found that published vulnerabilities in the first half of 2020...
129 Vulnerabilities Patched in Microsoft's September 2020 Update Tuesday (2020-Sep Patch Tuesday)Despite maintaining the continued high volume of vulnerabilities disclosed...
Andrey Krutskikh, special representative of the President of Russia for international cooperation in the field of information security, said on...
Since the dawn of the digital age, Iranian hackers have been infamous for their attacks on critical infrastructures, targeting governments,...
Browsertunnel is a tool for exfiltrating data from the browser using the DNS protocol. It achieves this by abusing dns-prefetch,...
Resource monitor that shows usage and stats for processor, memory, disks, network and processes.Python port of bashtop.FeaturesEasy to use, with...
Last week on Malwarebytes Labs, we dug into security hubris on the Lock and Code podcast, explored ways in which...
Chinese hacker group Winnti attacked at least five Russian developers of banking software, as well as a construction company. According...