Google’s Bazel Exposed to Command Injection Threat
Security researchers have recently unearthed a supply-chain vulnerability within Bazel, one of Google’s flagship open-source products. The flaw centered around a...
Security researchers have recently unearthed a supply-chain vulnerability within Bazel, one of Google’s flagship open-source products. The flaw centered around a...
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and...
Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. "The campaign...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
During this past year, we have seen an increase in the use of malicious ads (malvertising) and specifically those via...
MetaStealer is a popular piece of malware that came out in 2022, levering previous code base from RedLine. Stealers have...
During the past month, we have observed an increase in the number of malicious ads on Google searches for “Zoom”,...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Nitrogen is the name given to a campaign and associated malware that have been distributed via malicious search ads. Its...
Last year, we documented malware distribution campaigns both via malvertising and compromised sites delivering Atomic Stealer (AMOS) onto Mac users....
An ongoing campaign of malicious ads has been targeting Chinese-speaking users with lures for popular messaging applications such as Telegram...
How's your vulnerability management program doing? Is it effective? A success? Let's be honest, without the right metrics or analytics,...
Cybersecurity researchers have detailed an updated version of the malware HeadCrab that's known to target Redis database servers across the...
The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.-based small office and...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS, and...
Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat...
Unleashing the power of cloud with containerisation One question that the NCSC is often asked, is whether to use containers...
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is...
The FBI has disrupted the KV Botnet used by Chinese Volt Typhoon state hackers to evade detection during attacks targeting...
CISA warned today that a patched kernel security flaw affecting Apple iPhones, Macs, TVs, and watches is now being actively...
Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after...
CISA has urged manufacturers of small office/home office (SOHO) routers to ensure their devices' security against ongoing attacks attempting to hijack...