A week in security (March 23 – March 29)
Last week on Malwarebytes Labs: Stay safe! We don’t just report on scams—we help detect them Cybersecurity risks should never spread beyond a headline. If…
Last week on Malwarebytes Labs: Stay safe! We don’t just report on scams—we help detect them Cybersecurity risks should never spread beyond a headline. If…
Ravie LakshmananMar 30, 2026Threat Intelligence / Network Intrusion Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part…
Stop Scams UK is accelerating its work to fight online fraud in the UK after years of putting the right foundations and technology in place.…
In a domain still striving for gender parity, Dr. Priyanka Sunder (PD) stands as a compelling example of what two decades of purpose-driven leadership looks…
Ukraine’s frontline cyber defense agency became the subject of its own investigation last week after an unknown threat actor built a convincing fake version of…
Iran-linked hackers have broken into FBI director Kash Patel’s personal email inbox, publishing photographs of the director and other documents to the internet, the hackers…
New macOS Infinity Stealer uses Nuitka Python payload and ClickFix Pierluigi Paganini March 30, 2026 Infinity Stealer targets macOS via fake Cloudflare CAPTCHA, using Nuitka;…
Chinese artificial intelligence start-up DeepSeek suffered a prolonged outage overnight that extended into early Monday morning, disrupting service for hundreds of millions of users, according…
What a year 2024 has been! It saw the Paris Olympics, the Celtics winning banner #18 (this was big for me), a new Elden Ring,…
VoidLink shows that AI-assisted malware is now a mature, operational tool rather than a lab experiment, compressing what once required a full team into days…
Container sandboxes are part of routine AI agent testing and deployment. Agents use them to run code, edit files, and interact with system resources without…
The Hacker NewsMar 24, 2026Security Operations / Network Security Cybersecurity has changed fast. Roles are more specialized, and tooling is more advanced. On paper, this should…