Cyber Risk Index (2H’ 2021): An Assessment for Security Leaders
We take a look at our latest Cyber Risk Index (CRI) findings across North America, Europe, Asia-Pacific, and Latin/South America,...
We take a look at our latest Cyber Risk Index (CRI) findings across North America, Europe, Asia-Pacific, and Latin/South America,...
We recently investigated a case related to the BlackCat ransomware group using the Trend Micro Vision One™ platform, which comes...
A new marketplace named Industrial Spy that focuses on the sale of stolen data appeared in the threat landscape. Malware...
It is important to realize that uploading certain files to VirusTotal may result in leaking confidential data, which could result...
Last week on Malwarebytes Labs: Credential-stealing malware disguises itself as Telegram, targets social media usersOld Play Store apps served notice...
US CISA adds a VMware privilege escalation flaw and a Google Chrome type confusion issue to its Known Exploited Vulnerabilities...
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective....
Enemybot is a DDoS botnet that targeted several routers and web servers by exploiting known vulnerabilities. Researchers from Fortinet discovered...
GitHub reported that threat actors used stolen OAuth user tokens to exfiltrate private data from several organizations. GitHub uncovered threat...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The U.S. government blames North Korea-linked APT Lazarus for the recent $600 million Ronin Validator cyber heist. The U.S. government...
This week the Anonymous collective and its affiliates have targeted multiple Russian organizations stealing gigabytes of data. This week Anonymous...
Threat actors are targeting Ukrainian government agencies with phishing attacks delivering the IcedID malware. The Ukrainian Computer Emergency Response Team...
Threat actors are targeting Ukrainian government organizations with exploits for XSS vulnerabilities in Zimbra Collaboration Suite (CVE-2018-6882). Ukraine’s CERT (CERT-UA)...
The Conti ransomware gang has claimed responsibility for the recent attack against Nordex, one of the largest manufacturers of wind...
A new powerful crimeware called ZingoStealer was released for free by a threat actor known as Haskers Gang. ZingoStealer is a...
Cisco fixed a critical flaw in Cisco Wireless LAN Controller (WLC) that could allow an unauthenticated, remote attacker to take...
Google Chrome 100.0.4896.127 addresses a new high-severity zero-day vulnerability tracked as CVE-2022-1364, actively exploited by threat actors in the wild....
Cybersecurity experts would have you believe that your organization’s employees have a crucial role in bolstering or damaging your company’s...
The analysis of a recent sample SunnyDay ransomware revealed some similarities with other ransomware, such as Ever101, Medusa Locker, Curator,...
The US government agencies warned of threat actors that are targeting ICS and SCADA systems from various vendors. The Department...
The U.S. CISA added the CVE-2022-24521 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity...
The deadline for filing your taxes in the US is nearly upon us. April 18 is the very last date...
After having tracked stalkerware for years, Malwarebytes can reveal that in 2021, detections for apps that can non-consensually monitor another...