Group-IB CEO remains in prison – the Russian-led company has been ‘blacklisted’ in Italy
The latest executive order from the Italian ACN agency banned Group-IB, a Russian-led cybersecurity firm from working in the government...
The latest executive order from the Italian ACN agency banned Group-IB, a Russian-led cybersecurity firm from working in the government...
Last week on Malwarebytes Labs: Why MITRE matters to SMBsApple’s child safety features are coming to a Messages app near...
IoT gizmos make our lives easier, but we forget that these doohickeys are IP endpoints that act as mini-radios. They...
Russia-linked APT29 (Cozy Bear or Nobelium) launched a spear-phishing campaign targeting diplomats and government entities. In mid-January 2022, security researchers...
Synology warns customers that some of its NAS devices are affected by multiple critical Netatalk vulnerabilities. Synology has warned customers...
Threat actors exploited a bug in the Fuse protocol used by DeFi platforms Rari Capital and Fei Protocol and stole...
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective....
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Researchers discovered flaws in the Azure Database for PostgreSQL Flexible Server that could result in unauthorized cross-account database access in...
Emotet operators are testing new attack techniques in response to Microsoft’s move to disable Visual Basic for Applications (VBA) macros...
A series of DDoS attacks launched by Russian hacktivists are targeting several Romanian government websites. The Romanian national cyber security...
Google has released an update for its Chrome browser that includes 30 security fixes. The latest version of the stable...
According to Microsoft, at least six Kremlin-backed hacking groups have been attacking Ukraine in the digital space in an onslaught...
A joint Cybersecurity Advisory, coauthored by cybersecurity authorities of the United States (CISA, NSA, and FBI), Australia (ACSC), Canada (CCCS),...
Twitter verification is a two-edged sword. According to Twitter, it’s supposed to let people know “that an account of public...
Fraudsters like confusing and disorienting people. Successful ones avoid obvious lines of approach and try things you wouldn’t expect. A...
When someone finds their social media account compromised, they first think about letting their followers know. And they do. They...
Google has launched its new “nutrition labels” for apps, a feature it promised in the spring of 2021. This release...
OpRussia continues, less than a week after my last update Anonymous has hacked other Russian companies and leaked their data...
The Computer Emergency Response Team in Ukraine (CERT-UA) has announced that Ukraine government web portals and pro-Ukraine sites are subjected...
QNAP urges customers to disable the AFP file service protocol on their NAS devices until it fixes critical Netatalk flaws....
Cybercrime gang FIN7’s badUSB attacks serve as a reminder of two key vulnerabilities present among all organizations. The criminal group...
Ukraine CERT-UA warns of ongoing DDoS attacks targeting pro-Ukraine sites and the government web portal. Ukraine ‘s computer emergency response...
We tend to accept that younger folks are supposed to be more tech savvy, given they’ve grown up with computers...