Author: Cybernoz
Last week on Malwarebytes Labs: On the ThreatDown blog: Stay safe! We don’t just report on threats—we help safeguard your…
Shashank Bajpai, CISO & CTSO at Yotta 2026 is the execution year for India’s Digital Personal Data Protection (DPDP) regime…
A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code…
CyberVolk, a pro-Russia hacktivist group first documented in late 2024, has resurfaced with a sophisticated ransomware-as-a-service (RaaS) offering called VolkLocker…
Prometheus is an open-source monitoring and alerting system built for environments where services change often and failures can spread fast….
A critical vulnerability affecting Sierra Wireless routers has been added to its Known Exploited Vulnerabilities (KEV) catalog. This decision comes…
Initial access broker Storm-0249 has evolved from a mass phishing operation into a sophisticated threat actor weaponizing legitimate Endpoint Detection…
People are starting to hand more decisions to AI agents, from booking trips to sorting digital files. The idea sounds…
Dec 15, 2025Ravie LakshmananRansomware / Cybercrime The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new…
Asahi Group Holdings Ltd. is weighing the creation of a dedicated cybersecurity unit as it continues to deal with the…
Mobile security has long depended on tight control over how apps and services interact with a device. A new paper…
Manufacturing leaders may feel that ransomware risk has settled, but new data shows the threat is shifting in ways that…
