IT administrators’ passwords are awful too
Are IT administrators any better at coming up with decent passwords? Research says they aren’t. The key is under the...
Read more →Are IT administrators any better at coming up with decent passwords? Research says they aren’t. The key is under the...
Read more →Researchers have found that a recently disclosed vulnerability in Cisco IOS XE has already rendered thousands of compromised devices. An...
Read more →Cybersecurity could be as easy as 1-2-3. The problem, though, is that people have to want it. Cybersecurity could be...
Read more →Threat actors are doubling down on brand impersonation by using lookalike domain names. Threat actors are known for impersonating popular...
Read more →The US is pushing member countries of the Counter Ransomware Initiative to stop paying ransoms to cybercriminals. As the White...
Read more →Last week on Malwarebytes Labs: Explained: Quishing Update now! Atlassian Confluence vulnerability is being actively exploited Giant health insurer struck...
Read more →Cloud service provider Shadow has notified customers about a data breach affecting over 500,000 users. Cloud infrastructure provider Shadow has...
Read more →A sophisticated threat actor has been using Google ads to deliver custom malware payloads to victims for months while flying...
Read more →We explain what quishing is and provide information about some current quishing campaigns. Quishing is phishing using QR (Quick Response) codes....
Read more →The Philippine Health Insurance Corporation (PhilHealth), has confirmed that it was unprotected by antivirus software when it was attacked by...
Read more →Microsoft Threat Intelligence has revealed that it has been tracking the active exploitation of a vulnerability in Atlassian Confluence software...
Read more →The CISA Known Exploited Vulnerabilities catalog has grown to cover more than 1,000 vulnerabilities since its launch in November 2021....
Read more →