Category: MalwareBytes

an RCE vulnerability in Azure Service Fabric Explorer
04
Apr
2023

an RCE vulnerability in Azure Service Fabric Explorer

Researchers disclosed how they found a remote code execution vulnerability in Azure Service Fabric Explorer. Researchers at Orca Security disclosed how…

how to spot a verified account
04
Apr
2023

how to spot a verified account

Significant changes to Twitter’s verification identifiers mean new rules for ensuring whether an account is real. Twitter has made some…

New macOS malware steals sensitive info, including a user's entire Keychain database
04
Apr
2023

New macOS malware steals sensitive info, including a user’s entire Keychain database

MacStealer could be an infamous stealer in the making, but right now, it needs improvement, according to Malwarebytes expert. A…

Steer clear of this EE phish that wants your card details
01
Apr
2023

Steer clear of this EE phish that wants your card details

We take a look at a phish targeting users of the EE mobile network. Watch out for this piece of…

3 tips for creating backups you can rely on when ransomware strikes
01
Apr
2023

3 tips for creating backups you can rely on when ransomware strikes

Backups are your last line of defense against ransomware, if they work. Backups are an organization’s last line of defense…

3 tips to raise your backup game
01
Apr
2023

3 tips to raise your backup game

Because backups are the dental floss of cybersecurity—the thing that everyone knows they should do, that everyone intends to do,…

Smart home assistants at risk from NUIT ultrasound attack
31
Mar
2023

Smart home assistants at risk from NUIT ultrasound attack

We take a look at research for an IoT attack called NUIT, capable of hijacking voice assistants via ultrasonic attack….

3CX desktop app used in a supply chain attack
31
Mar
2023

3CX desktop app used in a supply chain attack

Researchers have found that the 3CX desktop app may be compromised and used in supply chain attacks. Researchers have found…

Bing and other Microsoft applications fall victim to account takeover flaw
31
Mar
2023

Bing and other Microsoft applications fall victim to account takeover flaw

We take a look at the “BingBang” flaw which allowed for search engine manipulation in Bing. Researchers from Wiz have…

Update now! Apple fixes actively exploited vulnerability and introduces new features
31
Mar
2023

Update now! Apple fixes actively exploited vulnerability and introduces new features

Apple has released security updates and new features for several of its products, including a fix for an actively exploited…

instagram app icon on smartphone
30
Mar
2023

“Log-out king” Instagram scammer gets accounts taken down, then charges to reinstate them

A fraudster going by “OBN Brandon” has been defrauding Instagram influencers and entertainment figures out of hundreds of thousands of…

ChatGPT helps both criminals and law enforcement says Europol report
29
Mar
2023

ChatGPT helps both criminals and law enforcement says Europol report

Subject matter experts at Europol were asked to explore how criminals can abuse LLMs such as ChatGPT, as well as…