Category: MalwareBytes
We have seen several high-profile accounts that were taken over on X (formerly Twitter) only to be used for cryptocurrency…
The peer-to-peer review source G2 has released its Winter 2024 reports, ranking ThreatDown products on top across several Endpoint Detection…
Ransomware groups are liars, yes, but even when these dangerous cybercriminals would ransack organizations and destroy entire companies, a few…
Each year, an estimated 13.5 million people in the US are victim to stalking. This is a worrying fact stated…
January 7, 2024 – UK Police are investigating a sexual assault on the avatar of a girl aged under 16…
SMTP smuggling is a technique that allows an attacker to send an email from pretty much any address they like….
British police are investigating a case involving a virtual sexual assault of a girl’s avatar. Even though there was no…
Bug bounty programs that pay people for finding bugs are a very useful tool for improving the security of software….
In what seems like yet another attempt to adapt its platform to prepare for new regulations, Facebook has started rolling…
In a surprising move, in a letter to legal representatives of victims of the recent 23andMe data breach, the company…
Europols’s spotlight report ‘Online fraud schemes: a web of deceit’, looks into online fraud schemes—a major crime threat in the…
In what might be conceived as one of Microsoft’s new year resolutions, it has disclosed that it’s turned off the…