CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction
At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool...
At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool...
Prometheus—a ransomware build based on Thanos that locked up victims’ computers in the summer of 2021—included a major “vulnerability” that...
LockBit ransomware gang claims to have hacked the cybersecurity firm Mandiant, which is investigating the alleged security breach. Today the...
In this report, we investigate the reasons that the DeadBolt ransomware family is more problematic for its victims than other...
Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces. If you like the site, please...
Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces. If you like the site, please...
Updating endpoints on a network can be a daunting task. Testing before rollout can take time. Delays to patches going...
The FBI recently issued an announcement about a fraudulent scheme that proves there is no low that’s too low for...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Microsoft’s Digital Crimes Unit (DCU) announced the seizure of domains used by Iran-linked APT Bohrium in spear-phishing campaigns. Microsoft’s Digital Crimes...
A nation-state actor is attempting to exploit the Follina flaw in a recent wave of attacks against government entities in...
Last week on Malwarebytes Labs: Intuit phish says “We have put a temporary hold on your account”The Quad commits to...
During the bug hunting activity, Red Team Research (RTR) detected 2 zero-day bugs on GEMINI-NET, a RESI Informatica solution. It’s...
Resecurity, Inc. (USA) has identified an increase in activity within hacktivist groups conducted by a new group called “Cyber Spetsnaz”....
Tor has a storied reputation in the world of online privacy. The open-source project lets people browse the Internet more...
Proof-of-concept exploits for the critical CVE-2022-26134 vulnerability in Atlassian Confluence and Data Center servers are available online. Proof-of-concept exploits for...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Hackers have stolen over $250,000 in Ethereum from Bored Ape Yacht Club (BAYC), this is the third security breach it...
Atlassian has addressed on Friday an actively exploited critical remote code execution flaw (CVE-2022-26134) in Confluence Server and Data Center...
Operation Russia continues, albeit much more slowly than last month, RKPLaw, Vyberi Radio, and Metprom Group are the last victims....
GitLab addresses a critical security vulnerability, tracked as CVE-2022-1680, that could be exploited by an attacker to take over users’...
Chinese LuoYu Hackers Using Man-on-the-Side Attacks to Deploy WinDealer Backdoor An “extremely sophisticated” China-linked APT tracked as LuoYu was delivering malware...
Compared to other API technologies like REST and GraphQL, gRPC is lightweight and exceptionally robust, thanks in large part to...
The Malwarebytes Threat Intelligence team monitors the threat landscape continuously and produces monthly ransomware reports based on a mixture of...