Category: MalwareBytes

A week in security (August 28
05
Sep
2023

A week in security (August 28

A list of topics we covered in the week of August 28 to September 3, 2023. Last week on Malwarebytes…

Supply chain related security risks, and how to protect against them
05
Sep
2023

Supply chain related security risks, and how to protect against them

We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition,…

A firsthand perspective on the recent LinkedIn account takeover campaign
02
Sep
2023

A firsthand perspective on the recent LinkedIn account takeover campaign

It started with a password reset email in the middle of the night. Not long ago I wrote about a…

Victim records deleted after spyware vendor compromised
01
Sep
2023

Victim records deleted after spyware vendor compromised

We take a look at another compromise of a mobile spyware app maker, and ask whether this action comes with…

map of the world projected on a face
01
Sep
2023

Qakbot botnet infrastructure suffers major takedown

The Qakbot botnet has suffered a major setback after its infrastructure was heavily disrupted by US and European law enforcement…

Prompt injection could be the SQL injection of the future, warns NCSC
01
Sep
2023

Prompt injection could be the SQL injection of the future, warns NCSC

The NCSC has warned about integrating LLMs into your own services or platforms. Prompt injection and data poisoning are just…

Shakespeare confused behind laptop
31
Aug
2023

Social Security Numbers leaked in ransomware attack on Ohio History Connection

Ohio History Connection acknowledged that in a ransomware attack the attackers may have had access to 7,600 SSNs. The Ohio…

3 reasons why your endpoint security is not enough
31
Aug
2023

3 reasons why your endpoint security is not enough

Join our upcoming webinar and learn about weaknesses in your current endpoint security setup and how to address them. Despite…

How “EDR Extra Strength” simplifies traditional EDR complexity
31
Aug
2023

How “EDR Extra Strength” simplifies traditional EDR complexity

Learn how EDR Extra Strength can help IT teams save time, money, and stop more threats. Traditional Endpoint Detection and…

Meal delivery service Purfoods announces major data breach
30
Aug
2023

Meal delivery service Purfoods announces major data breach

We take a look at a breach notice from food delivery service PurFoods. An organisation that provides home delivery meals has…

Cisco VPNs without MFA are under attack by ransomware operator
30
Aug
2023

Cisco VPNs without MFA are under attack by ransomware operator

Several researchers are seeing ransomware attacks targetting Cisco VPNs without MFA The Cisco Product Security Incident Response Team (PSIRT) has…

"An influx of Elons," a hospital visit, and magic men: Becky Holmes shares more romance scams: Lock and Code S04E18
30
Aug
2023

“An influx of Elons,” a hospital visit, and magic men: Becky Holmes shares more romance scams: Lock and Code S04E18

Becky Holmes is a big deal online. Hugh Jackman has invited her to dinner. Prince William has told her she…