Patch now! Exchange servers attacked by Hafnium zero-days

Microsoft has released updates to deal with 4 zero-day vulnerabilities being used in an attack chain aimed at users of Exchange Server.

Read more

Talking Emotet’s takedown with Adam Kujawa: Lock and Code S02E02

This week on Lock and Code, we talk to Adam Kujawa, security evangelist and director of Malwarebytes Labs, about the dangerous malware Emotet

Read more

A week in security (December 14 – December 20)

A roundup of cybersecurity news from December 14 – 20, including SolarWinds, smart toys, Egregor, and many other topics.

Read more

SolarWinds advanced cyberattack: What happened and what to do now

Possibly the largest hacking operation of 2020 was just unveiled. In this blog we share what we know and what you should do right now.

Read more

A zero-day guide for 2020: Recent attacks and advanced preventive techniques

Zero-day vulnerabilities—and their potential, related attacks—can drive any security team mad. Here’s how you can bulk up your defenses.

Read more

Facial recognition: tech giants take a step back

Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law.

Read more

A week in security (March 2 – 8)

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Read more

Washington Privacy Act welcomed by corporate and nonprofit actors

The Washington Privacy Act would extend new data rights of access, correction, and deletion to Washington residents, with new rules on facial recognition.

Read more

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.

Read more

Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks

Researchers called it KNOB, a clever attack against the firmware of a Bluetooth chip that can allow hackers to successfully hijack paired devices and steal their sensitive data. Are users at risk?

Read more

Select your language