“TicTacToe Dropper” Malware Distribution Tactics Revealed
A recent study conducted by the FortiGuard team has shed light on a sophisticated malware distribution strategy observed throughout 2023. In...
A recent study conducted by the FortiGuard team has shed light on a sophisticated malware distribution strategy observed throughout 2023. In...
Just over $22bn worth of cryptocurrency was laundered in 2023, a 30% drop from the previous year, with nefarious actors...
Prudential Financial has disclosed a cybersecurity breach. Detected on February 5 2024, the breach involved unauthorized access to certain company systems.In...
Nation-state threat actors are making use of generative AI tools, including large language models (LLMs) like ChatGPT, in their cyber...
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users....
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
MetaStealer is a popular piece of malware that came out in 2022, levering previous code base from RedLine. Stealers have...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
An ongoing campaign of malicious ads has been targeting Chinese-speaking users with lures for popular messaging applications such as Telegram...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Nitrogen is the name given to a campaign and associated malware that have been distributed via malicious search ads. Its...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
Microsoft has released security patches to address multiple vulnerabilities in their software and products.The vulnerabilities that have been classified as...
Zoom has released security updates to address a critical vulnerability (CVE-2024-24691) in their products. The vulnerability has a Common Vulnerability...
The Zoom desktop and VDI clients and the Meeting SDK for Windows are vulnerable to an improper input validation flaw...
Hackers are believed to have used a stolen private key to mint and steal over 1.79 billion PLA tokens, a...
The DuckDuckGo browser has unveiled a new end-to-end encrypted Sync & Backup feature that lets users privately and securely synchronize...
A logic flaw between Ubuntu's 'command-not-found' package suggestion system and the snap package repository could enable attackers to promote malicious...
Battery maker VARTA AG announced yesterday that it was targeted by a cyberattack that forced it to shut down IT...
Microsoft warned today in an updated security advisory that a critical vulnerability in Exchange Server was exploited as a zero-day before...
Microsoft is automatically enabling Windows Extended Protection on Exchange servers after installing this month's 2024 H1 Cumulative Update (aka CU14)....
The LockBit ransomware gang claims to be behind the recent cyberattack on Fulton County, Georgia, and is threatening to publish...
Update February 14, 16:50 EST: Article and title revised after Microsoft retracted the "active exploitation" update added to the CVE-2024-21413...