Categories: Threat Intelligence Tags: malvertising Tags: ads Tags: google Tags: dynamic search ads Tags: python Tags: pycharm Tags: malware Dynamically generated ads can be problematic when the content they are created from has been compromised. (Read more…) The post ‘Accidental’…
Tag: Malwarebytes Labs
Update now! Apple patches a raft of vulnerabilities
Categories: Exploits and vulnerabilities Categories: News Tags: iLeakage Tags: side-channel Tags: Safari Tags: CVE-2023-40413 Tags: CVE-2023-40416 Tags: CVE-2023-40423 Tags: CVE-2023-42487 Tags: CVE-2023-42841 Tags: CVE-2023-41982 Tags: CVE-2023-41997 Tags: CVE-2023-41988 Tags: CVE-2023-40447 Tags: CVE-2023-42852 Tags: CVE-2023-32434 Tags: CVE-2023-41989 Tags: CVE-2023-38403 Tags: CVE-2023-42856…
Octo Tempest cybercriminal group is “a growing concern”—Microsoft
Categories: News Categories: Ransomware Tags: ALPHV Tags: Octo Tempest Tags: RaaS Tags: LOTL Tags: social engineering Tags: SIM swapping A group of cybercriminals known for advanced social engineering attacks has joined one of the biggest ransomware groups as an affiliate.…
Patch…later? Safari iLeakage bug not fixed
Categories: Exploits and vulnerabilities Categories: News Apple has fixed a bunch of security flaws, but not iLeakage, a side-channel vulnerability in Safari. (Read more…) The post Patch…later? Safari iLeakage bug not fixed appeared first on Malwarebytes Labs. This article has…
Update Chrome now! Google patches another actively exploited vulnerability
Categories: Exploits and vulnerabilities Categories: News Google has updated its Chrome Stable Channel to fix, among other things, an actively exploited vulnerability (Read more…) The post Update Chrome now! Google patches another actively exploited vulnerability appeared first on Malwarebytes Labs.…
Dependabot impersonators cause trouble on GitHub
Categories: Personal Tags: dependabot Tags: GitHub Tags: password Tags: attack Tags: imitate Tags: profile Tags: avatar Tags: commit Tags: resource Tags: dependency We take a look at a clever attack imitating GitHub’s Dependabot in order to publish rogue project updates.…
Malicious ad served inside Bing’s AI chatbot
Categories: Threat Intelligence Tags: bing chat Tags: AI Tags: malvertising Tags: ads Users looking for software downloads may be tricked into visiting malicious websites via their interaction with Bing Chat. (Read more…) The post Malicious ad served inside Bing’s AI…
Google’s Bard conversations turn up in search results
Categories: News Categories: Privacy Tags: Google Tags: Bard Tags: AI Tags: LLM Tags: crawled Tags: search After an update for Google’s Bard AI, users found that shared conversations were turning up in search results. (Read more…) The post Google’s Bard…
Malwarebytes Admin update: New Detection screens to manage threats!
Categories: Business We released version 1.2 of the Malwarebytes Admin app for IOS and Android last week, featuring new Detections features that adds visibility into threats. (Read more…) The post Malwarebytes Admin update: New Detection screens to manage threats! appeared…
Malwarebytes MDR wins G2 awards for “Best ROI,” “Easiest to Use,” and more
Categories: Business Customers rated Malwarebytes MDR as “Easiest to do Business With,” “Best Est. ROI,” “Easiest to Use,” and “Easiest Admin, and more. (Read more…) The post Malwarebytes MDR wins G2 awards for “Best ROI,” “Easiest to Use,” and more…
Xenomorph hunts cryptocurrency logins on Android
Categories: Personal Tags: android Tags: xenomorph Tags: malware Tags: phone Tags: google play Tags: cryptocurrency We take a look at a new Android scam involving Xenomorph malware and a hunt for cryptocurrency credentials. (Read more…) The post Xenomorph hunts cryptocurrency…
Pegasus spyware and how it exploited a WebP vulnerability
Categories: Android Categories: Apple Categories: Exploits and vulnerabilities Tags: Pegasus Tags: spyware Tags: nso Tags: webp Tags: libwebp Tags: buffer overflow The company behind the infamous Pegasus spyware used a vulnerability in almost every browser to plant their malware on…
Credit card thieves target Booking.com customers
Categories: News Categories: Scams Tags: booking.com Tags: obfuscated Tags: hospitality Tags: anti-sandboxing A very clever and complex phishing campaign uses organizations in the hospitality industry to get customers’ credit card information. (Read more…) The post Credit card thieves target Booking.com…
Child health data stolen in registry breach
Categories: Exploits and vulnerabilities Categories: News Categories: Ransomware Tags: MOVEit Tags: vulnerability Tags: Cl0p Tags: ransomware Tags: BORN Tags: NSC Tags: privacy Tags: identity theft Canadian healthcare organization Better Outcomes Registry & Network (BORN) has disclosed a data breach affecting…
Webinar: Bridging digital transformation & cybersecurity
Categories: Business How can organizations stay secure amidst the ceaseless tide of change? (Read more…) The post Webinar: Bridging digital transformation & cybersecurity appeared first on Malwarebytes Labs. This article has been indexed from Malwarebytes Labs Read the original article:…
A week in security (September 18 – September 24)
Categories: News Tags: Themebleed Tags: zero-days Tags: Apple Tags: T-Mobile Tags: MGM Tags: metaverse A list of topics we covered in the week of September 18 to September 24 of 2023 (Read more…) The post A week in security (September…
What does a car need to know about your sex life? Lock and Code S04E20
Categories: Podcast This week on the Lock and Code podcast, we speak with Mozilla’s Privacy Not Included team about the invasive data collection practices of modern cars. (Read more…) The post What does a car need to know about your…
TikTok flooded with fake celebrity nude photo Temu referrals
Categories: Personal Tags: TikTok Tags: celeb Tags: celebrity Tags: fake Tags: nude Tags: nudes Tags: scam Tags: referral Tags: temu A bogus celebrity leaked photos scam linked to Temu referrals is doing the rounds on TikTok. (Read more…) The post…
Ransomware group claims it’s “compromised all of Sony systems”
Categories: News The ransomware group RansomedVC says its selling Sony’s data. (Read more…) The post Ransomware group claims it’s “compromised all of Sony systems” appeared first on Malwarebytes Labs. This article has been indexed from Malwarebytes Labs Read the original…
T-Mobile spills billing information to other customers
Categories: News Categories: Personal Tags: T-Mobile Tags: billing details Tags: data breach Tags: glitch T-Mobile customers recently found other subscribers’ information on their online dashboards. (Read more…) The post T-Mobile spills billing information to other customers appeared first on Malwarebytes…
Emergency update! Apple patches three zero-days
Categories: Exploits and vulnerabilities Categories: News Tags: Apple Tags: emergency Tags: update Tags: CVE-2023-41991 Tags: CVE-2023-41992 Tags: CVE-2023-41993 Apple has released patches for three zero-day vulnerabilities that may have been actively exploited. (Read more…) The post Emergency update! Apple patches…
Steer clear of cryptocurrency recovery phrase scams
Categories: Personal Tags: cryptocurrency Tags: mark cuban Tags: scam Tags: phish Tags: phishing Tags: wallet Tags: hot Tags: cold Tags: metamask Tags: extension Tags: browser Tags: mobile Tags: android Tags: search engine We take a look at a common cryptocurrency…
Involved in a data breach? Here’s what you need to know
Categories: News Categories: Personal If you’ve received a message from a company saying your data has been caught up in a breach, you might be unsure what to do next. Well, we have some tips for you… (Read more…) The…
DoppelPaymer ransomware group suspects identified
Categories: News Categories: Ransomware More DoppelPaymer ransomware group suspects have been identified by blockchain investigations and had search warrants executed against them. (Read more…) The post DoppelPaymer ransomware group suspects identified appeared first on Malwarebytes Labs. This article has been…
Compromised Free Download Manager website was delivering malware for years
Categories: News Tags: Free Download Manager Tags: Linux Tags: Debian Tags: crond Tags: reverse shell After three years of delivering malware to selected visitors, Free Download Manager was alerted to the fact that its website had been compromised. (Read more…)…
Microsoft AI researchers accidentally exposed terabytes of sensitive data
Categories: Business Categories: News Tags: blob Tags: SAS Tags: Microsoft Tags: Wiz Tags: secrets Microsoft AI researchers posted a long-living, overly permissive, SAS token on GitHub, exposing 38 TB of data. (Read more…) The post Microsoft AI researchers accidentally exposed…
The mystery of the CVEs that are not vulnerabilities
Categories: Business Categories: Exploits and vulnerabilities Categories: News Tags: CVE Tags: NVD Tags: vulnerabilities Tags: CVE-2020-19909 Researchers have raised the alarm about a large set of CVE for older bugs that never were vulnerabilities. (Read more…) The post The mystery…
The privacy perils of the Metaverse
Categories: Personal Tags: metaverse Tags: meta Tags: Facebook Tags: VR Tags: AR Tags: XR Tags: reality Tags: virtual reality Tags: privacy Tags: safety We take a look at the privacy implications of the Metaverse. (Read more…) The post The privacy…
A week in security (September 11 – September 17)
Categories: News Tags: week Tags: security Tags: September Tags: 2023 Tags: iPhone Tags: A list of topics we covered in the week of September 11 to September 17 of 2023 (Read more…) The post A week in security (September 11…
Ransomware group steps up, issues statement over MGM Resorts compromise
Categories: Business Tags: MGM Resorts Tags: hotel Tags: casino Tags: ransomware Tags: blackcap Tags: ALPHV We take a look at a ransomware group’s claims that they were the ones responsible for the MGM Resorts attack. (Read more…) The post Ransomware…
ThemeBleed exploit is another reason to patch Windows quickly
Categories: Exploits and vulnerabilities Categories: News Tags: theme Tags: themepack Tags: Microsoft Tags: cve-2023-38146 Tags: msstyles An exploit has been released for a vulnerability in .themes that was patched in the September 2023 Patch Tuesday update. (Read more…) The post…
Malwarebytes named leader across six endpoint security categories, marking its ease of use, in G2 Fall 2023 results
Categories: Business Malwarebytes is the only vendor recognized as “Easiest to Use” with the “Easiest Admin” for its EDR and MDR solutions in the recent G2 Fall 2023 results. (Read more…) The post Malwarebytes named leader across six endpoint security…
Europol lifts the lid on cybercrime tactics
Categories: News Categories: Ransomware Tags: Europol Tags: Phishing Tags: RDP Tags: VPN Tags: Exchange Tags: LOTL Tags: BEC Tags: ransomware Tags: IAB Tags: crypter Tags: Flubot A Europol report discusses developments in cyberattacks, new methodologies, and threats as observed by…
Watch out, this LastPass email with “Important information about your account” is a phish
Categories: News Categories: Scams We caught a nasty phish yesterday, likely looking to feed on victims of last year’s LastPass breach. (Read more…) The post Watch out, this LastPass email with “Important information about your account” is a phish appeared…
Malwarebytes wins every Q2 MRG Effitas award & scores 100% on new phishing test
Categories: Business Dive into where we prevented more than the rest and how we were able to do it. (Read more…) The post Malwarebytes wins every Q2 MRG Effitas award & scores 100% on new phishing test appeared first on…
PSA: Ongoing Webex malvertising campaign drops BatLoader
Categories: Threat Intelligence Tags: malvertising Tags: batloader Corporate users performing Google searches for the popular conferencing software Webex are being targeted in a malvertising campaign. (Read more…) The post PSA: Ongoing Webex malvertising campaign drops BatLoader appeared first on Malwarebytes…
Patch now! September Microsoft Patch Tuesday includes two actively exploited zero-days
Categories: Business Categories: Exploits and vulnerabilities Categories: News Tags: Microsoft Tags: Adobe Tags: Android Tags: Apple Tags: Chrome Tags: SAP Tags: Exchange Tags: Visual Studio Tags: CVE-2023-36761 Tags: CVE-2023-36802 Tags: CVE-2023-29332 Tags: Azure Microsoft’s September 2023 Patch Tuesday is another…
3 reasons why your endpoint security is not enough
Categories: Business Watch our recent webinar and learn about weaknesses in your current endpoint security setup and how to address them. (Read more…) The post 3 reasons why your endpoint security is not enough appeared first on Malwarebytes Labs. This…
iPhone 15 launch: Wonderlust scammers rear their heads
Categories: Personal Tags: apple Tags: wanderlust Tags: cryptocurrency Tags: event Tags: BTC Tags: ETH Tags: fake We take a look at a cryptocurrency scam riding on the coat tails of the Apple Wonderlust event. (Read more…) The post iPhone 15…
Major cyberattack leaves MGM Resorts reeling
Categories: News Categories: Personal Tags: MGM resorts Tags: hotel Tags: casino Tags: attack Tags: cyber Tags: shutdown MGM resorts has suffered a major cyberattack leading to shutdowns across the US. (Read more…) The post Major cyberattack leaves MGM Resorts reeling…
Two Apple issues added by CISA to its catalog of known exploited vulnerabilities
Categories: Exploits and vulnerabilities Categories: News Tags: Blastpass Tags: citizenlab Tags: pegasus Tags: nso Tags: cisa Tags: apple Tags: cve-2023-41064 Tags: cve-2023-41061 Tags: buffer overflow CISA has added two recently discovered Apple vulnerabilities to its catalog of known exploited vulnerabilities.…
Microsoft Teams used to deliver DarkGate Loader malware
Categories: Business Categories: News Tags: Microsoft Teams Tags: DarkGate Tags: Loader Tags: Trojan Tags: Sharepoint Tags: AutoIt Researchers have found a new distribution method for the DarkGate Loader which circumvents the security features in Microsoft Teams. (Read more…) The post…
Update Chrome now! Google patches critical vulnerability being exploited in the wild
Categories: Exploits and vulnerabilities Categories: News Tags: Google Tags: Chrome Tags: CVE-2023-4863 Tags: WebP Tags: buffer overflow Tags: 116.0.5845.187/.188 Chrome users are being urged to patch a critical vulnerability for which an exploit is available. (Read more…) The post Update…
Ransomware review: September 2023
Categories: Threat Intelligence Ransomware news in August was highlighted by the sudden fall of CL0P from the list of the monthly most active gangs, while Lockbit returned to the number one spot. (Read more…) The post Ransomware review: September 2023…
A week in security (September 4 – September 10)
Categories: News Tags: week Tags: security Tags: September Tags: 2023 Tags: Atomic stealer Tags: Microsoft breach A list of topics we covered in the week of September 4 to September 10 of 2023 (Read more…) The post A week in…
The main causes of ransomware reinfection
Categories: News Categories: Ransomware Tags: ransomware Tags: reinfection Tags: stolen credentials Tags: vulnerabilities Tags: infected backups Tags: logging Tags: forensic investigation Tags: backdoors The main causes for getting reinfected with ransomware can be prevented by performing a forensic analysis. (Read…
Wyze home cameras temporarily show other people’s security feeds
Categories: Personal Tags: home camera Tags: network Tags: security Tags: feed Tags: room Tags: house Tags: smart We take a look at reports of a popular home camera product temporarily displaying the wrong feeds to other users. (Read more…) The…
Re-air: What teenagers face growing up online: Lock and Code S04E19
Categories: Podcast This week on Lock and Code, we revisit an earlier conversation with a Bay Area teenager about the hardest parts about growing up online. (Read more…) The post Re-air: What teenagers face growing up online: Lock and Code…
Chrome’s “Enhanced Ad Privacy”: What you need to know
Categories: Personal Tags: google Tags: chrome Tags: website Tags: API Tags: Topics Tags: tracking Tags: ads Tags: adverts Tags: cookies We take a look at a Chrome popup related to Topics API, which you may be seeing in the near…
A history of ransomware: How did it get this far?
Categories: News Categories: Ransomware Tags: history Tags: ransomware Tags: bulletproof hosting Tags: cryptocurrency Tags: encryption Tags: fast internet Tags: government protection Tags: RaaS Tags: LockBit Tags: pentester tools Tags: code We tell you about the origin of ransomware and what…
FreeWorld ransomware attacks MSSQL—get your databases off the internet
Categories: News Categories: Ransomware An attack that uses a database as an entry point to a network reminds us that you should never expose your databases to the internet. (Read more…) The post FreeWorld ransomware attacks MSSQL—get your databases off…
How Microsoft’s highly secure environment was breached
Categories: News An investigation by Microsoft has finally revealed how China-based hackers circumvented its highly isolated and restricted production environment in May 2023. (Read more…) The post How Microsoft’s highly secure environment was breached appeared first on Malwarebytes Labs. This…
FreeWorld ransomware attacks MSSQL—get your databases off the Internet
Categories: News Categories: Ransomware A attack that uses a database as an entry point to a network reminds us that you should never expose your databases to the Internet. (Read more…) The post FreeWorld ransomware attacks MSSQL—get your databases off…
Smart chastity device exposes sensitive user data
Categories: Personal Tags: chastity cage Tags: IoT Tags: Internet of Things Tags: romance Tags: toy Tags: device Tags: expose Tags: user data We take a look at reports of an IoT chastity cage device which is exposing user data. (Read…
X wants your biometric data
Categories: Personal Tags: twitter Tags: x Tags: social media Tags: social network Tags: register Tags: biometric Tags: ID Tags: passport Tags: verify Tags: verification Tags: premium Tags: elon musk We take a look at plans to voluntarily upload identification to…
Mac users targeted in new malvertising campaign delivering Atomic Stealer
Categories: Threat Intelligence Tags: amos Tags: apple Tags: malvertising Tags: atomic stealer Tags: wallets Tags: crypto Tags: mac While malvertising delivering infostealers has largely been a Windows problem, Mac users are getting targeted as well. (Read more…) The post Mac…
Password-stealing Chrome extension smuggled on to Web Store
Chrome browser extensions can steal passwords from the text input fields in websites, despite Chrome’s latest security and privacy standard, Manifest V3. (Read more…) The post Password-stealing Chrome extension smuggled on to Web Store appeared first on Malwarebytes Labs. This…
A week in security (August 28 – September 3)
Categories: News Tags: week Tags: security Tags: August Tags: 2023 A list of topics we covered in the week of August 28 to September 3, 2023. (Read more…) The post A week in security (August 28 – September 3) appeared…
Supply chain related security risks, and how to protect against them
We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. (Read more…) The post Supply chain related security risks, and how to protect against them appeared first on Malwarebytes Labs. This article…
A firsthand perspective on the recent LinkedIn account takeover campaign
Categories: News Tags: LinkedIn Tags: sessions Tags: contacts It started with a password reset email in the middle of the night. (Read more…) The post A firsthand perspective on the recent LinkedIn account takeover campaign appeared first on Malwarebytes Labs.…
Qakbot botnet infrastructure suffers major takedown
Categories: News Categories: Ransomware Tags: Qakbot Tags: FBI Tags: law enforcement Tags: takedown Tags: removal tool Tags: HIBP Tags: Spamhaus The Qakbot botnet has suffered a major setback after its infrastructure was heavily disrupted by US and European law enforcement…
Prompt injection could be the SQL injection of the future, warns NCSC
Categories: News Tags: AI Tags: ML Tags: LLM Tags: chatgpt Tags: data poisoning Tags: SQL Tags: prompt injection The NCSC has warned about integrating LLMs into your own services or platforms. Prompt injection and data poisoning are just some of…
Social Security Numbers leaked in ransomware attack on Ohio History Connection
Categories: News Categories: Ransomware Tags: Ohio History Connection Tags: ransomware Tags: LockBit Tags: SSN Tags: phishing Ohio History Connection acknowledged that in a ransomware attack the attackers may have had access to 7,600 SSNs. (Read more…) The post Social Security…
3 reasons why your endpoint security is not enough
Categories: Business Join our upcoming webinar and learn about weaknesses in your current endpoint security setup and how to address them. (Read more…) The post 3 reasons why your endpoint security is not enough appeared first on Malwarebytes Labs. This…
How “EDR Extra Strength” simplifies traditional EDR complexity
Categories: Business Learn how EDR Extra Strength can help IT teams save time, money, and stop more threats. (Read more…) The post How “EDR Extra Strength” simplifies traditional EDR complexity appeared first on Malwarebytes Labs. This article has been indexed…
Meal delivery service PurFoods announces major data breach
Categories: Business Tags: purfoods Tags: breach Tags: ransomware Tags: data Tags: information We take a look at a breach notice from food delivery service PurFoods. (Read more…) The post Meal delivery service PurFoods announces major data breach appeared first on…
Cisco VPNs without MFA are under attack by ransomware operator
Categories: Business Categories: News Tags: Cisco Tags: VPN Tags: Akira Tags: ransomware Tags: brute-force Tags: credential stuffing Tags: password spraying Several researchers are seeing ransomware attacks targetting Cisco VPNs without MFA (Read more…) The post Cisco VPNs without MFA are…
“An influx of Elons,” a hospital visit, and magic men: Becky Holmes shares more romance scams: Lock and Code S04E18
Categories: Podcast This week on the Lock and Code podcast, we speak with Becky Holmes about how she flips the script on romance scammers, and what more governments should be doing to help. (Read more…) The post “An influx of…
FBI confirms Barracuda patch is not effective for exploited ESG appliances
Categories: Exploits and vulnerabilities Categories: News Tags: Barracuda ESG Tags: CVE-2023-2868 Tags: SEASPY Tags: SUBMARINE Tags: WHIRLPOOL The FBI repeats the warning by Barracuda that all ESG appliances should immediately be replaced because the patch was ineffective. (Read more…) The…
A week in security (August 21 – August 27)
Categories: News Tags: week Tags: security Tags: august Tags: 2023 Tags: trusted advisor Tags: cyrus Tags: A list of topics we covered in the week of August 21 to August 27 of 2023 (Read more…) The post A week in…
2.6 million DuoLingo users have scraped data released
Categories: News Tags: DuoLingo Tags: data breach Tags: email adress Tags: username Tags: real name Using an openly available API, cybercrimnals were able to scrape the data of 2.6 million DuoLingo users. (Read more…) The post 2.6 million DuoLingo users…
Google strengthens its Workplace suite protection
Categories: Business Tags: google Tags: gmail Tags: workplace Tags: protection Tags: sensitive Tags: trigger Tags: business We take a look at how Google is strengthening protections across its Workplace products, and Gmail in particular. (Read more…) The post Google strengthens…
Smart lightbulb and app vulnerability puts your Wi-Fi password at risk
Categories: Business Tags: business Tags: home Tags: personal Tags: router Tags: wi-fi Tags: wireless Tags: network Tags: home Tags: bulb Tags: smart bulb Tags: IoT Tags: app Tags: TP-Link We take a look at reports that a smart lightbulb and…
Update now! Google Chrome’s first weekly update has arrived
Categories: Exploits and vulnerabilities Tags: stable channel Tags: weekly updates Tags: CVE-2023-4427 Tags: CVE-2023-4428 Tags: CVE-2023-4429 Tags: CVE-2023-4430 Tags: CVE-2023-4431 Tags: use after free Tags: out of bounds Tags: heap corruption The first of Chrome’s now weekly security updates fixes…
Teenage members of Lapsus$ ransomware gang convicted
Categories: Business Tags: business Tags: hack Tags: hacked Tags: compromise Tags: lapsus$ Tags: convicted Tags: crime Tags: ransomware Tags: leak Tags: breach A wave of video game developer compromises has come to a court-based conclusion. (Read more…) The post Teenage…
Malwarebytes acquires Cyrus Security
Categories: Personal Cybersecurity isn’t limited to defending against malware anymore; it’s about ensuring your entire digital identity remains unscathed and your private details remain private. (Read more…) The post Malwarebytes acquires Cyrus Security appeared first on Malwarebytes Labs. This article…
Adobe ColdFusion vulnerability exploited in the wild
Categories: Exploits and vulnerabilities Categories: News Tags: Adobe Tags: ColdFusion Tags: CVE-2023-26359 Tags: CVE-2023-26360 Tags: critical Tags: known exploited Tags: deserialization A second Adobe ColdFusion vulnerability that was patched in April has been added to CISA’s known exploited vulnerabilities catalog.…
DarkGate reloaded via malvertising and SEO poisoning campaigns
Categories: Threat Intelligence Tags: darkgate Tags: autoit Tags: malvertising Tags: seo poisoning The new version of the DarkGate malware is currently actively being distributed via malspam, malicious ads and SEO poisoning. (Read more…) The post DarkGate reloaded via malvertising and…
Ivanti Sentry critical vulnerability—don’t play dice, patch
Categories: Exploits and vulnerabilities Categories: News Tags: Ivanti Tags: Sentry Tags: MobileIron Tags: CVE-2023-38035 Tags: MICS Tags: port 8443 There is some uncertainty about whether a vulnerability in Ivanti Sentry is being exploited in the wild, but why take the…
Update now! WinRAR files can be abused to run malware
Categories: Exploits and vulnerabilities Categories: News Tags: WinRAR Tags: CVE-2023-40477 Tags: RCE Tags: Windows 11 A new version of WinRAR is available that patches two vulnerabilities attackers could use for remote code execution. (Read more…) The post Update now! WinRAR…
Alert Prioritization and Guided Remediation: The future of EDR
Categories: Business Defeat alert fatigue using specialized threat intelligence. (Read more…) The post Alert Prioritization and Guided Remediation: The future of EDR appeared first on Malwarebytes Labs. This article has been indexed from Malwarebytes Labs Read the original article: Alert…
A week in security (August 14 – August 20)
Categories: News Tags: Augsut 2023 Tags: week in security A list of topics we covered in the week of August 14 to August 20 of 2023 (Read more…) The post A week in security (August 14 – August 20) appeared…
QR codes used to phish for Microsoft credentials
Categories: News Tags: QR codes Tags: attachment Tags: phishing Tags: Bing Tags: Microsoft Tags: credentials Researchers have been monitoring a phishing campaign that uses QR codes and Bing redirects to lead targets to phishing sites. (Read more…) The post QR…
Chrome will soon start removing extensions that may be unsafe
Categories: Personal Tags: chrome Tags: browser Tags: rogue Tags: malicious Tags: malware Tags: extension Tags: remove Tags: delete Tags: uninstall We take a look at news that Chrome will soon start asking users if they want to remove outdated extensions.…
Trusted Advisor puts you in the security driving seat
Categories: Personal Malwarebytes’ new Trusted Advisor makes security easy with a comprehensive, at-a-glance, real-time assessment. (Read more…) The post Trusted Advisor puts you in the security driving seat appeared first on Malwarebytes Labs. This article has been indexed from Malwarebytes…
Exchange Server security updates updated
Categories: Exploits and vulnerabilities Categories: News Tags: Exchange Tags: CVE-2023-21709 Tags: August update Tags: re-release Microsoft Exchange Server administrators may have to install a re-released security patch (Read more…) The post Exchange Server security updates updated appeared first on Malwarebytes…
Patch now! Citrix Sharefile joins the list of actively exploited file sharing software
Categories: Exploits and vulnerabilities Categories: News Tags: Citrix Tags: ShareFile Tags: CVE-2023-24489 Tags: RCE Tags: unauthenticated Tags: vulnerability Tags: PoC Citrix ShareFile can be exploited remotely by unauthenticated attackers. (Read more…) The post Patch now! Citrix Sharefile joins the list…
Attackers demand ransoms for stolen LinkedIn accounts
Categories: News Tags: LinkedIn Tags: rambler.ru Tags: MFA Tags: brute-force Tags: credential stuffing LinkedIn support channels are being swamped by users that have been locked out of their accounts. (Read more…) The post Attackers demand ransoms for stolen LinkedIn accounts…
Citrix NetScalers backdoored in widespread exploitation campaign
Categories: Exploits and vulnerabilities Categories: News Tags: Citrix Tags: NetScalers Tags: Germany Tags: CVE-2023-3519 Tags: Fox-IT Tags: DIVD Researchers have found almost 2000 backdoored Citrix NetScalers, many of which were patched after the backdoor in the form of a web…
Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams
Categories: Threat Intelligence Tags: tech support scams Tags: fingerprinting Tags: steganography This tech support scam is one of the most long running and covert ones we have ever seen. (Read more…) The post Catching up with WoofLocker, the most elaborate…
Beware malware posing as beta versions of legitimate apps, warns FBI
Categories: News Tags: FBI Tags: warning Tags: beta-testing Tags: malicious code Tags: crypto recovery Tags: scammers The FBI has issued a warning about two related types of fraud, malicious beta-testing apps and crypto recovery schemes. (Read more…) The post Beware…
Malvertisers up their game against researchers
Categories: Threat Intelligence Tags: malvertising Tags: google Tags: ads Tags: malware Tags: fingerprinting Malicious ads via search engine results page are getting harder to identify thanks to advanced fingerprinting techniques (Read more…) The post Malvertisers up their game against researchers…
Discord.io confirms theft of 760,000 members’ data
Categories: News Tags: Discord.io Tags: Discord Tags: data breach Discord.io has confirmed that personally identifiable information of 760,000 members was stolen in a data breach. The third-party Discord service has been shut down for the time being (Read more…) The…
Ford says it’s safe to drive its cars with a WiFi vulnerability
Categories: Exploits and vulnerabilities Categories: News Tags: Ford Tags: Lincoln Tags: SYNC 3 Tags: CVE-2023-29468 Tags: TI WLink Tags: MCP driver A vulnerability in the SYNC 3 infotainment will not have a negative effect on driving safety, says Ford. (Read…
PCMag ranks Malwarebytes #1 cybersecurity vendor
Categories: Business PCMag readers named Malwarebytes the #1 most-recommended security software vendor in its list of Best Tech Brands for 2023. (Read more…) The post PCMag ranks Malwarebytes #1 cybersecurity vendor appeared first on Malwarebytes Labs. This article has been…
A week in security (August 7 – August 13)
Categories: News Tags: Zoom Tags: YouTube Tags: Chrome Tags: TikTok Tags: ransomware Tags: Cloudflare Tags: robocallers Tags: security advisor A list of topics we covered in the week of August 7 to August 13 of 2023 (Read more…) The post…
A new type of “freedom,” or, tracking children with AirTags, with Heather Kelly: Lock and Code S04E17
Categories: Podcast This week on Lock and Code, we speak with Heather Kelly about why how parents are using AirTags to give their kids freedom. (Read more…) The post A new type of “freedom,” or, tracking children with AirTags, with…
Google’s “browse privately” is nothing more than a word play, lawyers say
Categories: News Categories: Privacy Tags: Google Tags: Chrome Tags: Incognito Tags: private mode Tags: fingerprinting Tags: cookies Tags: tracking Private browsing is not what users expect it to be (Read more…) The post Google’s “browse privately” is nothing more than…
YouTube makes sweeping changes to tackle spam on Shorts videos
Categories: News Tags: YouTube Tags: shorts Tags: video Tags: spam Tags: scam Tags: comments Tags: replies Tags: block Tags: remove YouTube is making drastic changes to combat a a growing tide of spam comments on the Shorts video category. (Read…
Old exploit kits still kicking around in 2023
Categories: Threat Intelligence Tags: exploit kits Tags: eks Tags: rigek Tags: purplefoxek Internet Explorer may be a thing of the past, but there are still users and threat actors trying to deliver drive-by downloads. (Read more…) The post Old exploit…