A scanning tool for open-sourced software packages? Yes, please!
The Open Source Security Foundation (OpenSSF), a collective of industry leaders aimed at improving the security of open-source software (OSS),...
The Open Source Security Foundation (OpenSSF), a collective of industry leaders aimed at improving the security of open-source software (OSS),...
Last week on Malwarebytes Labs: Google, Apple, and Microsoft step hand in hand into a passwordless futureOpenSea warns of Discord...
A few days after F5 addressed the critical CVE-2022-1388 Remote Code execution flaw in its BIG-IP products, researchers created exploits...
China-linked Mustang Panda APT group targets entities in Asia, the European Union, Russia, and the US in a new wave of...
Conti Ransomware gang claims to have hacked the Peru MOF – Dirección General de Inteligencia (DIGIMIN) and stolen 9.41 GB....
This post provides a timeline of the events related to Russia invasion of Ukraine from the cyber security perspective. Below...
The National Institute of Standards and Technology (NIST) has released updated guidance for defending against supply-chain attacks. The National Institute...
The American agricultural machinery manufacturer AGCO announced that has suffered a ransomware attack that impacted its production facilities. AGCO, one of the...
While we recently “celebrated” World Password Day, almost every security outlet keeps telling us that passwords alone are not enough....
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The US Government offers up to $15 million for information that helps identify and locate leadership and co-conspirators of the...
Researchers discovered a new Windows malware, dubbed Raspberry Robin, with worm-like capabilities that spreads via removable USB devices. Cybersecurity researchers...
Experts spotted a malware campaign that is the first one using a technique of hiding a shellcode into Windows event...
The U.S. Department of Treasury sanctioned cryptocurrency mixer Blender.io used by North Korea-linked Lazarus APT. The U.S. Department of Treasury...
Billing fraud is one of the most common sources of income for cybercriminals. There are currently a number of known...
Experts investigate how stolen Facebook accounts are used as part of a well-established fraud industry inside Facebook. No eyebrows were raised...
QNAP addressed multiple vulnerabilities, including a critical remote execution flaw affecting the QVR video surveillance solution. QNAP has addressed multiple...
OpenSea, the primary marketplace for buyers and sellers of non-fungible tokens (NFTs), has reported major problems with its Discord support...
I don’t know about you, but I open Instagram to look at cool photos of pets, not to make a...
The Anonymous collective and the volunteer group Ukraine IT Army continues to launch cyber attacks on Russian entities. The Anonymous...
Researchers discovered a sophisticated malware framework, dubbed NetDooka, distributed via a pay-per-install (PPI) malware service known as PrivateLoader. Trend Micro...
A site has been bouncing around YouTube comments for the past couple of weeks. The site sometimes changes, the messages...
If you’ve dealt with a scammer, you’ll know that making up stories is their bread and butter. Think about it:...
Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has...