Why we’re no longer doing April Fools’ Day
The internet is filled with falsehoods. We’re forever investigating new scams here at Malwarebytes, and it’s so hard to know […]
Why we’re no longer doing April Fools’ Day Read More »
The internet is filled with falsehoods. We’re forever investigating new scams here at Malwarebytes, and it’s so hard to know […]
Why we’re no longer doing April Fools’ Day Read More »
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features Read More »
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and
In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability Read More »
Researchers found a vulnerability in Chrome that was abused in the wild against organizations in Russia. Google has released an
Vulnerability in most browsers abused in targeted attacks Read More »
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that
Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA Read More »
Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads.
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection Read More »
Long gone are the days when a simple backup in a data center was enough to keep a business secure.
Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity Read More »
Cisco Talos is actively tracking an ongoing campaign targeting users in Ukraine with malicious LNK files, which run a PowerShell
Gamaredon campaign abuses LNK files to distribute Remcos backdoor Read More »