Meta accessed women’s health data from Flo app without consent, says court
A jury has ruled that Meta accessed sensitive information from a woman’s reproductive health tracking app without consent. The app in question is called Flo…
A jury has ruled that Meta accessed sensitive information from a woman’s reproductive health tracking app without consent. The app in question is called Flo…
CERT-UA warns of UAC-0099 phishing attacks targeting Ukraine’s defense sector Pierluigi Paganini August 07, 2025 Ukraine’s CERT-UA warns of phishing attacks by UAC-0099 targeting defense…
The Alliance for Creativity and Entertainment (ACE) announced the shutdown of Rare Breed TV, a major illegal IPTV service provider, after reaching a financial settlement…
Nvidia Corporation has issued a strong statement asserting that its graphics processing units (GPUs) contain no backdoors, kill switches, or spyware, directly addressing growing concerns…
Security researchers have uncovered a novel attack technique that exploits weaknesses in hybrid Active Directory (AD) and Entra ID environments to bypass authentication and exfiltrate…
We’re excited to announce that MRG Effitas, a globally recognized security assessment firm, has awarded Malwarebytes the prestigious MRG Effitas Android 360° Certificate, one of…
Security researchers uncovered a series of critical zero-day vulnerabilities in HashiCorp Vault in early August 2025, the widely adopted secrets management solution. These flaws, spanning…
Threat actors are placing a higher priority on neutralizing endpoint detection and response (EDR) systems in order to remain stealthy in the dynamic world of…
The Hague, Netherlands, August 7th, 2025, CyberNewsWire Over 1.2 million internet-connected healthcare devices and systems with exposure that endangers patient data, as shown in new…
Google has confirmed that a corporate Salesforce database it used to manage small and medium business (SMB) contacts was compromised by a known cybercriminal group.…
Air France and KLM announced on Wednesday that attackers had breached a customer service platform and stolen the data of an undisclosed number of customers.…
Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish covert command-and-control (C2) channels, effectively…