Apple patches ‘worst macOS bug in recent memory’ after it was used in the wild
A newly discovered bug, patched in macOS 11.3, allowed hackers to circumvent much of Apple’s built-in malware detection for programs...
A newly discovered bug, patched in macOS 11.3, allowed hackers to circumvent much of Apple’s built-in malware detection for programs...
In the latest example of a supply chain attack, cybercriminals delivered malware to customers of the business password manager Passwordstate...
We recently said deepfakes “remain the weapon of choice for malign interference campaigns, troll farms, revenge porn, and occasionally humorous...
This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in...
The Internet Watch Foundation (IWF), a not-for-profit organization in England whose mission is “to eliminate child sexual abuse imagery online”,...
Fortinet security researcher ‘accidentally discovered a unique way of tricking YouTube users. Due to Covid-19, as well as the recent...
A ransomware group made $260,000 by remotely encrypting files on QNAP computers using the 7zip archive software in an interval...
A threat actor dropped about 20 million Big Basket user reports containing personally identifiable details and hashed passwords on a...
Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function. You can use this tool...
Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well...
European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows...
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts...
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another...
In October 2020, the Indian grocery platform bigbasket suffered a data breach that exposed over 20 million customer records. The...
In March 2021, the manga fan site MangaDex suffered a data breach that resulted in the exposure of almost 3...
Last week on Malwarebytes Labs, we interviewed Youssef Sammouda, a 21-year-old bug bounty hunter who is focused on finding vulnerabilities...
Experts cautioned that a text message scam infecting Android phones is expanding across the UK. The message, which appears to...
In this article, we’re going to deep dive into the role of Covalent, the unified blockchain API. So, the first...
A Russian hacking group claims to have obtained schematics for some yet-to-be-released Apple products. The hackers have demanded a $50...
A program that monitors and collects the Social Media posts of the American public even on issues related to planned...
Following a cyberattack on the corporate password manager Passwordstate, Click Studios, an Australian software house, has advised consumers to reset...
Introducing TScopyIt is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the...
Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and...
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government...