ShadowPad Malware is Being Sold Privately to Chinese Espionage
Since 2017, five separate Chinese threat groups have used ShadowPad, an infamous Windows backdoor that allows attackers to download additional...
Since 2017, five separate Chinese threat groups have used ShadowPad, an infamous Windows backdoor that allows attackers to download additional...
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing...
PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft...
Threat actors claim to have a database containing private information on roughly 70 million AT&T customers, but the company denies...
Experts spotted a modified version of WhatsApp for Android, which offers extra features, but that installs the Triada Trojan on...
The South Korean multinational Samsung revealed that it can disable its Samsung TV sets remotely using the TV Block feature. Samsung...
The OpenSSL Project patched a high-severity vulnerability, tracked as CVE-2021-3711, that can allow an attacker to change an application’s behavior...
Citizen Lab uncovered a new zero-click iMessage exploit that was used to deploy the NSO Group’s Pegasus spyware on devices belonging...
In November 2016, the game developer Suba Games suffered a data breach which led to the exposure of 6.1M unique...
In October 2018, the restaurant reservation service Eatigo suffered a data breach that exposed 2.8 million accounts. The data included...
In life, when you encounter something momentuous—a sudden job loss, a routine check-up that revealed an illness you can’t afford...
A few weeks ago we blogged about a vulnerability in home routers that was weaponized by the Mirai botnet just...
Cryptocurrency platforms have become an easy target for professional hackers. Only in the past month, there were several cases.Recall that...
The US military personnel have lost over $822 million in different kinds of internet crimes and scams between 2017 and...
A zero-day vulnerability in Razer external device installation software – be it a razer mouse, a keyboard, or any other...
WhatsApp users sometimes feel the official app is lacking a useful feature of one sort or another, be it animated...
Passive DNS collection and monitoring built with Golang, Clickhouse and Grafana: dnsmonster implements a packet sniffer for DNS traffic. It...
Go scripts for finding an API key / some keywords in repository Update V1.0.1Removing some checkers Adding example file contains...
The FBI shared info about OnePercent Group that has been actively targeting US organizations in ransomware attacks since at least...
Researchers warn that threat actors are actively exploiting Realtek SDK vulnerabilities since their technical details were publicly disclosed. Researchers from SAM Seamless...
US CISA issued an urgent alert to warn admins to address ProxyShell vulnerabilities on-premises Microsoft Exchange servers. The US Cybersecurity...
Last Saturday the Cybersecurity and Infrastructure Security Agency issued an urgent warning that threat actors are actively exploiting three Microsoft...
Last week on Malwarebytes Labs: Podcast: Katie Moussouris hacked Clubhouse. Her emails went unanswered for weeks.How to troubleshoot hardware problems...
This blog post was authored by Hossein Jazi In late July 2021, we identified an ongoing spear phishing campaign pushing...