Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts...
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts...
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another...
In October 2020, the Indian grocery platform bigbasket suffered a data breach that exposed over 20 million customer records. The...
In March 2021, the manga fan site MangaDex suffered a data breach that resulted in the exposure of almost 3...
Last week on Malwarebytes Labs, we interviewed Youssef Sammouda, a 21-year-old bug bounty hunter who is focused on finding vulnerabilities...
Experts cautioned that a text message scam infecting Android phones is expanding across the UK. The message, which appears to...
In this article, we’re going to deep dive into the role of Covalent, the unified blockchain API. So, the first...
A Russian hacking group claims to have obtained schematics for some yet-to-be-released Apple products. The hackers have demanded a $50...
A program that monitors and collects the Social Media posts of the American public even on issues related to planned...
Following a cyberattack on the corporate password manager Passwordstate, Click Studios, an Australian software house, has advised consumers to reset...
Introducing TScopyIt is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the...
Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and...
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
10,000+ unpatched ABUS Secvest home alarm systems could be remotely disabled exposing customers to intrusions and thefts. Researchers from Eye Security have...
The cybersecurity community has lost its star, the popular hacker Dan Kaminsky has passed away. The popular cyber security researcher...
ToxicEye is a new Remote Access Trojan (RAT) that exploits the Telegram service as part of it command and control...
In September 2020, the cashback reward program ShopBack suffered a data breach. The incident exposed over 20 million unique email...
Hackers reportedly gained access to blueprints of the latest Apple developments by attacking the servers of the Taiwanese company Quanta...
It appears that the developers of the ‘Sysrv’ botnet have been working hard in putting out a more sophisticated version...
Attackers distribute offers to install the "latest update" of the messenger disguised as official Facebook posts. Victims risk losing access...
The Telegram service is being exploited by operators of a new Remote Access Trojan (RAT) to keep control of their...
While Apple was working on the preparations for the 'Spring Loaded' event that went live on Tuesday, 20th April, the...
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag...