Gmail-linked Facebook accounts vulnerable to attack using a chain of bugs—now fixed
A security researcher has disclosed how he chained together multiple bugs in order to take over Facebook accounts that were...
A security researcher has disclosed how he chained together multiple bugs in order to take over Facebook accounts that were...
Threat actors have rediscovered an old and little-used feature of web URLs, the innocuous @ symbol we usually see in...
More voices are being raised against the use of everyday technology repurposed to attack and stalk people. Most recently, it’s...
Experts spotted over 200 Android apps on the Play Store distributing spyware called Facestealer used to steal sensitive data. Trend Micro researchers...
Facebook-themed messages are a frequent source of bogus links from both spam and compromised accounts. Whether you receive the messages...
US Critical Infrastructure Security Agency (CISA) adds critical CVE-2022-30525 RCE flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog....
Researchers spotted a threat actor using a custom PowerShell RAT targeting German users to gain intelligence on the Ukraine crisis....
The use of embedded HTML documents in phishing e-mails is a standard technique employed by cybercriminals. It does away with...
We recently observed a number of apps on Google Play designed to perform malicious activities such as stealing user credentials...
Apple released security updates to address a zero-day bug actively exploited in attacks against Macs and Apple Watch devices. Apple...
Researchers devised an attack technique to tamper the firmware and execute a malware onto a Bluetooth chip when an iPhone...
When selecting the right cybersecurity vendor to protect their operations, small- and medium-sized businesses (SMBs) can lean on several third-party...
2021 saw a massive surge in detections of malware, adware, and Potentially Unwanted Programs (PUPs). It didn’t matter what the...
Researchers at Sucuri investigated a number of WordPress websites complaining about unwanted redirects and found websites that use fake CAPTCHA...
A 28-year-old Ukrainian national has been sentenced to four years in prison for selling access to hacked servers. Glib Oleksandr...
Last week on Malwarebytes Labs: How to spot the signs of a virtual kidnap scamVirtual credit cards coming to Chrome:...
This blog post was authored by Hossein Jazi and Jérôme Segura Populations around the world—and in Europe in particular—are following...
Researchers from threat intelligence firm Cyble analyzed the Eternity Project Tor website which offers any kind of malicious code. Researchers...
Threats and bluster play a key role in most online attacks: Ransomware has its ransom note; trolls threaten to ramp...
This post provides a timeline of the events related to Russia invasion of Ukraine from the cyber security perspective. Below...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Ukraine Computer Emergency Response Team (CERT-UA) reported a phishing campaign conducted by Armageddon APT using GammaLoad.PS1_v2 malware. Ukraine Computer Emergency...
Microsoft reported that the Sysrv botnet is targeting Windows and Linux servers exploiting flaws in the Spring Framework and WordPress. Microsoft Security...
The Pro-Russian volunteer movement known as LEGION is calling to launch DDoS attacks against the final of the Eurovision song...