US DoS offers a reward of up to $10M for leaders of REvil ransomware gang
The U.S. government offers up to $10 million for identifying or locating leaders in the REvil/Sodinokibi ransomware operation The Department...
The U.S. government offers up to $10 million for identifying or locating leaders in the REvil/Sodinokibi ransomware operation The Department...
The US DoJ has charged a REvil ransomware affiliate that is suspected to have orchestrated the attack on Kaseya MSP...
News overview Q3 2021 brought two new DDoS attack vectors, potentially posing a serious threat, including for major web resources....
We’ve seen quite a few complaints from gamers this past weekend, unable to load up and play games on the...
Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Electronics retail...
This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking"...
The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by...
The healthcare industry might be known for the work it does to treat patients. But it is also a prime...
Operation Cyclone – Six alleged affiliates with the Clop ransomware operation were arrested in an international joint law enforcement operation...
Kunyu, More Efficient Corporate Asset Collection 0x00 IntroduceTool introductionKunyu (kunyu), whose name is taken from , is actually a professional...
Last week on Malwarebytes Labs Celebrity jewelry house Graff falls victim to ransomwareLessons from a real-life ransomware attackIs Apple’s Safari...
Experts warn of an ongoing hacking campaign that already compromised at least nine organizations worldwide from critical sectors by exploiting...
A Hungarian government official confirmed that his government has bought and used the controversial NSO Group’s Pegasus spyware. Lajos Kosa,...
The FBI warns of an increase of fraudulent schemes leveraging cryptocurrency ATMs and QR Codes to facilitate payment. The FBI...
HashDB IDA PluginMalware string hash lookup Hash AlgorithmsClick Refresh Algorithms to pull a list of supported hash algorithms from...
Threat actors are impersonating cybersecurity firm Proofpoint to trick victims into providing Microsoft Office 365 and Gmail credentials. Cybercriminals are...
A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have...
Event Trace Log file reader in pure Python etl-parser is a pure Python 3 parser library for ETL Windows log...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The FBI issued a private industry notification (PIN) to warn of ransomware attacks that hit several tribal-owned casinos last year....
An HTTP Request Smuggling / Desync testing tool written in Python 3 AcknowledgementsA special thanks to James Kettle for his...
DeFi platforms are a privileged target for crooks, threat actors have stolen $55 million from bZx DeFi platform. Threat actors...
The Philips Tasy EMR comprehensive healthcare informatics solution is affected by two critical SQL injection vulnerabilities. The Philips Tasy EMR...
The Zero Day Initiative’s Pwn2Own Austin 2021 hacking contest has ended, and participants earned $1,081,250 for 61 zero-day flaws. Trend...