A week in security (January 11 – January 17)
Last week on Malwarebytes Labs, we looked at IoT problems, Microsoft’s Patch Tuesday, and how cybercriminals want access to your...
Last week on Malwarebytes Labs, we looked at IoT problems, Microsoft’s Patch Tuesday, and how cybercriminals want access to your...
A new Olympic season has begun in Russia. Many competitions have been moved online due to the COVID-19 pandemic. The...
 Cisco, an American Multinational Conglomerate stated this week it does not plan on fixing vulnerabilities in end-of-life (EOL) Cisco routers,...
 WhatsApp has told its two billion clients they should permit it to share information with its parent organization Facebook if...
 Bengaluru Police have confronted a freshly growing crime that goes under the name ATM fraud. In this ATM fraud, the...
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial...
Collect OSINT for GitLab groups and members and search the group and group members' snippets, issues, and issue discussions for...
A duo of white hat hackers claims to have earned $50,000 from Apple for reporting serious flaws that allowed them...
The U.S. National Security Agency has appointed Rob Joyce as the agency’s new director of cybersecurity, who has long experience...
German data regulator LfD announced a €10.4M fine under GDPR against the online laptop and electronic goods retailer NBB for...
President Joe Biden can’t bring his Peloton exercise equipment to the White House due to security reasons. According to a...
The European Medicines Agency (EMA) revealed Friday that COVID-19 vaccine documents stolen from its servers have been manipulated before the...
Summary: jsonparser 1.0.0 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via...
Summary: Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap...
In mid-2018, the Hong Kong-based retailer Romwe suffered a data breach which exposed almost 20 million customers. The data was...
In approximately February 2018, the employment website Jobandtalent suffered a data breach which then appeared for sale alongside other breaches...
 Scottish Environment Protection Agency (SEPA) said its digital systems have been severely affected by a ransomware attack since Christmas Eve....
 Joker's Stash opened in 2014 and was perhaps the most well-known underground carding site which gave new stolen credit card...
 The Linux Mint screensaver has been detected with a flaw, it was discovered by two children who were playing on...
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM. FeaturesFeatureful...
This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc... Check Documentation for...
Two vulnerabilities in the Orbit Fox WordPress plugin, a privilege-escalation issue and a stored XSS bug, can allow site takeover....