Ubisoft discloses unauthorized access to ‘Just Dance’ user data
Video game company Ubisoft confirmed a security breach that resulted in unauthorized access to ‘Just Dance’ user data. Ubisoft discloses...
Video game company Ubisoft confirmed a security breach that resulted in unauthorized access to ‘Just Dance’ user data. Ubisoft discloses...
PYSA and Lockbit were the most active ransomware gangs in the threat landscape in November 2021, researchers from NCC Group...
Researchers spotted a new botnet named Abcbot hat that mainly targeted Chinese cloud hosting providers over the past months. Security...
With recent news of the critical, zero-day vulnerability Apache Log4Shell, we explore how to detect and protect your Apache HTTP...
Learn more about some tactical measures people are already taking, and some strategic guidance for what to do after the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A Russian national was extradited to the US from Switzerland after he was charged for trading information stolen from hacked...
Microsoft warns of a couple of Active Directory flaws fixed with the November 2021 Patch Tuesday updates that could allow takeover of...
On his blog, Troy Hunt has announced a major milestone in the ‘Have I Been Pwned?’ project, thanks to the...
Google found more than 35,000 Java packages in the Maven Central repository that are impacted by flaws in the Apache...
Uptycs researchers have observed attacks related to miners, DDOS malware and some variants of ransomware actively leveraging LogforShell flaw in...
Important notice On December 18th, Log4j version 2.17.0 was released to address open vulnerabilities. It is highly recommended to update...
We often use machine-learning (ML) technologies to improve the quality of cybersecurity systems. But machine-learning models can be susceptible to...
DarkWatchman is a new lightweight javascript-based Remote Access Trojan (RAT) that uses novel methods for fileless persistence. Recently Prevailion experts...
Trying to adopt DevSecOps culture? Or already in the thick of it? Trend Research explores the cybersecurity trends for 2022...
The FBI warns that zero-day flaw in Zoho’s ManageEngine Desktop Central has been under active exploitation by nation-state actors since October. The Federal...
In August, the NFT for a cartoon rock sold for $1.3 million, and ever since then, much of the world...
The Belgian defense ministry was hit by a cyber attack, it seems that threat actors exploited the Log4Shell vulnerability. The...
An alleged APT group planted a backdoor in the network of a U.S. federal government commission associated with international rights....
I’ve been quite vocal on the impact of deepfakes, in terms of where the most harm takes place. Back in...
Last week on Malwarebytes Labs: Spear phish, whale phish, regular phish: What’s the difference?Kronos crippled by ransomware, service may be...
Security researchers devised a new attack vector exploiting the Log4Shell vulnerability on servers locally by using a JavaScript WebSocket connection....
Clop ransomware gang stolen confidential data from the UK police and leaked it in the dark web because the victim...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...