A week in security (January 6 – 12)
Last week on Malwarebytes Labs, we told readers how to check the safety of websites and their related files, explored...
Last week on Malwarebytes Labs, we told readers how to check the safety of websites and their related files, explored...
The patients of a facial surgical company in Florida, who were hacked recently, are now being threatened by hackers. The...
The authors behind the infamous TrickBot malware – a modular banking trojan that targets sensitive financial information and also acts...
Incorrect configuration allows you to access .env files or reading env variables. LaravelN00b automated scan .env files and checking debug...
Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition...
Security professionals responsible for vulnerability risk management are required to perform data querying and analysis on a regular basis to...
The Sodinokibi Ransomware attackers are pressuring Travelex, a foreign exchange company to pay a 6 million dollar ransom amount or...
Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has...
HeapInspect is designed to make heap much more prettier.Now this tool is a plugin of nadbg. Try it!FeaturesFree of gdb...
A group of hackers calling themselves Lazarus modified their previous scheme to steal cryptocurrency which was used in 2018. Hackers...
CHAPS is a PowerShell script for checking system security settings where additional software and assessment tools, such as Microsoft Policy...
Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware.Research paperWe present our approach and the findings...
Bapco, the national oil company of the Persian Gulf island nation of Bahrain, was reportedly targeted in a Dec. 29...
Ransomware has struck dead on organizations since it became a mainstream tool in cybercriminals’ belts years ago. From massive WannaCry...
“AppleJeus” operation was the first time “macOS” users were made victims by Lazarus. Herein, a manipulated application was used to...
The new Snake Ransomware family sets out to target the organizations’' corporate networks in all their entirety, written in Golang...
Researcher Alex Birsan, while examining PayPal's main authentication flow– discovered a critical security flaw that hackers could have exploited to...
IoTShark is a IOT monitoring service that allows users to monitor their IOT devices for trends in data sent/received. Ordinarily,...
The log file navigator, lnav, is an enhanced log file viewer that takes advantage of any semantic information that can...
Even in the most high-tech environments, remediation and risk reduction don’t just happen. In order for vulnerability risk management to...
A United States–funded mobile carrier that offers phones via the Lifeline Assistance program is selling a mobile device pre-installed with...
The number of charging stations at airports, bus stops, metro stations and other public places in Russia has been growing...
A triad of severe vulnerabilities in Cisco DCNM (Data Center Network Manager) stock allows hackers to remotely sidestep the verification...
TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems...