SolarWinds spurs investment in threat hunting, supplier vetting
Organizations that boosted security budgets in response to the SolarWinds hack invested the most in threat hunting. (“SolarWinds letters” by sfoskett is licensed...
Organizations that boosted security budgets in response to the SolarWinds hack invested the most in threat hunting. (“SolarWinds letters” by sfoskett is licensed...
Last week on Malwarebytes Labs, our podcast featured Eva Galperin who talked to us about defending online anonymity and speech....
Happy Monday! And if you haven’t yet checked the significance of this day—March 8—before grabbing coffee, today is International Women’s...
Supermicro, a U.S.-based information technology firm and VPN provider Pulse Secure have released their advisories regarding the vulnerabilities of their...
A new cyber campaign has come to known as a phishing attack. Outlook Web Access and Office 365 services...
Earlier this week, the company told its customers that several Cisco products have been exposed to DoS (Denial of Service)...
A bug bounty hunter was awarded $50,000 by Microsoft for revealing a security vulnerability leading to account deprivation. The expert...
In some media depictions, criminal and state-backed hackers are constantly portrayed as cunning and sophisticated, gliding inexorably toward their most...
HiddenEye: Reborn is my second try on doing multi-featured tool for human mistakes exploitation. Currently, HE: RE has mainly phishing...
Sub 404 is a tool written in python which is used to check possibility of subdomain takeover vulnerabilty and it...
This blog is part of an ongoing series sharing key takeaways from Rapid7’s 2020 Cloud Security Executive Summit. Interested in...
The European Banking Authority (EBA) disclosed a cyberattack that resulted in the hack of its Microsoft Exchange email system. The...
Microsoft updated its Microsoft Safety Scanner (MSERT) tool to detect web shells employed in the recent Exchange Server attacks. Early...
The presentation of Williams’s new Formula One car was ruined by hackers that forced the team to abandon the launch...
Thousands of organizations may have been victims of cyberattacks on Microsoft Exchange servers conducted by China-linked threat actors since January....
Summary: A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could...
Summary: Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or...
Summary: Crash in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or crafted...
Summary: The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed...
Summary: A buffer overflow vulnerability in the AT command interface of Gigaset DX600A v41.00-175 devices allows remote attackers to force...
Microsoft Exchange servers have become the latest victim of Chinese-sponsored cyber-attack. Chinese hackers targeted the Microsoft Exchange Servers earlier this...
Brave is a free and open-source web browser based on the Chromium web browser that had been established by...
Creator of McAfee antivirus software, Businessman John McAfee is charged under a conspiracy to commit fraud and money laundering in...
The administration of Biden is highly alarming about a series of recently found cyber intrusions that were associated with China...