4 over-hyped security vulnerabilities of 2022
What does it take to make the discussion of vulnerabilities useful? And where did this go wrong in 2022? A...
Read more →What does it take to make the discussion of vulnerabilities useful? And where did this go wrong in 2022? A...
Read more →This week on Lock and Code, we learn about how investigators actually track illicit cryptocurrency payments through cyberspace after they’ve...
Read more →We take a look at reports confirmed by SevenRooms that a third party vendor breach may have impacted its customers....
Read more →Taking advantage of cost effective and high traffic adult portals, a threat actor is secretly defrauding advertisers by displaying Google...
Read more →AV-TEST, a leading independent tester of cybersecurity solutions, has just ranked Malwarebytes as a Top Product for consumers and businesses...
Read more →Millions of Gemini cryptocurrency exchange users have had their data leaked on an underground forum. If you’re a user of...
Read more →A ransomware group claims to have stolen data from the H-Hotel chain, and is now threatening to leak it if...
Read more →Using IP blocks to make domains unreachable is a far-reaching method that has undesirable side effects because there is no...
Read more →News Posted: December 26, 2022 by Malwarebytes Labs The most interesting security related news from the week of December 19...
Read more →This week on Lock and Code, we talk about we technology no longer excites the public, and whether that’s because...
Read more →LastPass has posted an update to the August security incident that raises some questions about stolen unencrypted data The password...
Read more →Okta’s code repository on GitHub has been accessed by an unauthorized third party, but there’s no reason for customers to...
Read more →