Sextortion campaign uses Goontact spyware to target Android and iOS users
Security experts spotted a new malware strain, named Goontact, that allows its operators to spy on both Android and iOS...
Security experts spotted a new malware strain, named Goontact, that allows its operators to spy on both Android and iOS...
Microsoft and its partners have seized the primary domain used in the SolarWinds attack to identify the victims through sinkholing....
Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms....
Experts reported flaws in Medtronic ’s MyCareLink Smart 25000 Patient Reader product that could be exploited to take control of...
Norwegian cruise company Hurtigruten disclosed a cyber attack that impacted its entire worldwide digital infrastructure. The Norwegian cruise company Hurtigruten...
Researchers at Kaspersky discovered an average of 360,000 new malicious files every day over the past 12 months – 18,000...
What is Egregor? Egregor ransomware is a relatively new ransomware (first spotted in September 2020) that seems intent on making...
In early December, the National Cyber Security Centre, a UK-based cybersecurity body and a part of GCHQ, kicked off the next chapter...
Researchers have discovered a critical security flaw in WinZip 24 that targets users with malware. WinZip trial popup vulnerability...
The Russian Embassy in the United States has already called the accusations against Moscow baseless. They recalled that Vladimir Putin...
All statistics in this report are from the global cloud service Kaspersky Security Network (KSN), which receives information from components...
APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer and more to the excellent VS Code so you can...
A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS...
Back in July, Rapid7 released its first-ever National / Industry / Cloud Exposure Report, otherwise known as “NICER.” This report...
Sophos and ReversingLabs released SoReL-20M, a database containing 20 million Windows Portable Executable files, including 10M malware samples. Sophos and...
Apple addressed this week serious code execution vulnerabilities that affect its iOS and iPadOS mobile operating systems. Apple released security...
18,000 SolarWinds customers may have been impacted by the attack against its supply chain, the company said in a SEC filing....
Over the weekend we learned more about the sophisticated attack that compromised security firm FireEye, the US Treasury and Commerce...
Last week on Malwarebytes podcast we talked to Doug Levin, founder of the K12 cybersecurity resource center and advisor to the...
The world is moving very fast towards technology and materialism. Subsequently, it has become increasingly difficult for people to shun...
Corporate endpoint security technologies for mid-sized companies struggle to surprise us with anything brand new. They provide reliable protection against...
A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object.BackgroundFor background...
Stegseek is a lightning fast steghide cracker that can be used to extract hidden data from files. It is built...
On Dec. 12, 2020, FireEye provided detailed information on a widespread attack campaign involving a backdoored component of the SolarWinds...