DirtyMoe botnet infected 100,000+ Windows systems in H1 2021
DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than...
DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than...
The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the...
Boffins developed a tool dubbed DroidMorph that provides morphing of Android applications (APKs) and allows to create Android apps (malware/benign)...
The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more...
Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of...
Remember when we told you to patch your VPNs already? I hate to say “I told you so”, but I...
Earlier this month, Schneider Electric, a global supplier of energy and automation digital solutions published a security advisory for its...
After two months of break, a Middle Eastern advanced persistent-threat (APT) organization has resurfaced and is targeting government institutions in...
Squalr Official Website Join us on our Discord Channel Squalr is performant Memory Editing software that allows users to create...
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps. Using raw RDP...
The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last...
The British intelligence agency MI5 seized Boris Johnson ‘s phone over concerns related to the availability of his number online...
Jaroslaw Kaczynski, the leader of the Poland Law and Justice party, blames Russia for the recent cyberattack targeting top Polish politicians. Jaroslaw...
Summary: ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters....
Summary: An improper free of uninitialized memory can occur in DIAG services in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile...
Summary: Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or...
Summary: A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on...
Summary: A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on...
Summary: Key exchange without entity authentication in the Intel(R) Security Library before version 3.3 may allow an authenticated user to...
Last week on Malwarebytes Labs: How to delete your Instagram account.Working from home? You’re probably being spied on.Another one bites...
Ransomware attacks are on a different scale this year, with major attacks not just dismantling the business and management of...
Volkswagen announced that a massive data breach exposed the personal information of over 3.3 million customers after one of its...
In the recent analysis, experts discovered that the digital credit card skimming ecosystem evolves as experts identify new players, tooling,...
Experts analyzed how often children encounter cyber incidents in the online space. It turned out that every fifth child has...