8Base Ransomware Dark Web Site Seized, Four Operators Arrested
10
Feb
2025

8Base Ransomware Dark Web Site Seized, Four Operators Arrested

In a significant breakthrough against global cybercrime, Thai authorities announced today the arrest of four European nationals linked to the…

SHA256 Hash Calculation from Data Chunks
10
Feb
2025

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity and authenticity. It processes input data…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
10
Feb
2025

A suicide reveals the lonely side of AI chatbots, with Courtney Brown (Lock and Code S06E03)

Today on the Lock and Code podcast… In February 2024, a 14-year-old boy from Orlando, Florida, committed suicide after confessing…

Hackerone logo
10
Feb
2025

Gain Actionable, Data-backed Insights with HackerOne Recommendations

Meet HackerOne Recommendations: a built-in intelligence layer that continuously refines your security program, delivering personalized insights and your program’s historical performance….

Police arrest
10
Feb
2025

Police arrests 4 Phobos ransomware suspects, seizes 8Base sites

A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in…

12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit
10
Feb
2025

12K+ KerioControl Firewall Instances Vulnerable to 1-Click RCE Exploit

A critical security vulnerability, CVE-2024-52875, has been identified in GFI KerioControl firewalls, affecting versions 9.2.5 through 9.4.5. This flaw, which…

Handala Hackers Claim Israeli Police Breach, Leak 350,000 Files
10
Feb
2025

Handala Hackers Claim Israeli Police Breach, Leak 350,000 Files

The infamous Handala hacking group, with suspected ties to Iranian intelligence, has claimed responsibility for a cyberattack against Israel’s police…

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
10
Feb
2025

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

Feb 10, 2025Ravie LakshmananMalware / Payment Security Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit…

How EASM Can Prevent Subdomain Takeover
10
Feb
2025

How EASM Can Prevent Subdomain Takeover

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource…

1M+ Malware Samples Analysis Reveal Application Layer Abused for Stealthy C2
10
Feb
2025

1M+ Malware Samples Analysis Reveal Application Layer Abused for Stealthy C2

A recent analysis of over 1 million malware samples unveiled a trend where adversaries increasingly exploit the Application Layer of…

Naveen Goud
10
Feb
2025

Kraken Ransomware strikes Cisco servers to steal data

Cisco, a global leader in networking equipment, has recently fallen victim to a sophisticated cyberattack, where sensitive data from its…

GitHub Copilot’s New Agent Mode Let Developers Autonomously Complete Coding Tasks
10
Feb
2025

GitHub Copilot’s New Agent Mode Let Developers Autonomously Complete Coding Tasks

GitHub has unveiled a groundbreaking update to its AI-powered coding assistant, GitHub Copilot, with the introduction of Agent Mode.  This…