ESXi ransomware attacks use SSH tunnels to avoid detection
27
Jan
2025

ESXi ransomware attacks use SSH tunnels to avoid detection

ESXi ransomware attacks use SSH tunnels to avoid detection Pierluigi Paganini January 27, 2025 Threat actors behind ESXi ransomware attacks…

27
Jan
2025

Hack My Career: Harley Kimball’s Journey to DEFCON

In this interview, we explore Harley’s experience at DEFCON, the world’s largest hacker convention, where he took his skills to…

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
27
Jan
2025

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns….

Public cloud: Data sovereignty and data security in the UK
27
Jan
2025

Public cloud: Data sovereignty and data security in the UK

The UK government’s decision to designate datacentres as critical national infrastructure (CNI) in September 2024 signalled its ambition to build…

Hackers allegedly stole $69M from cryptocurrency platform Phemex
27
Jan
2025

Hackers allegedly stole $69M from cryptocurrency platform Phemex

Attackers allegedly stole $69 million from cryptocurrency platform Phemex Pierluigi Paganini January 27, 2025 Crooks stole at least $69 million…

Hackerone logo
27
Jan
2025

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…

Cyber Espionage
27
Jan
2025

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated…

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
27
Jan
2025

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…

week in security
27
Jan
2025

A week in security (January 20 – January 26)

Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…

Hackerone logo
27
Jan
2025

The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

Learn more about bug bounty programs and how they work > The Growing Trend At HackerOne, we’ve observed a notable…

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
27
Jan
2025

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

Jan 27, 2025Ravie LakshmananMalware / SEO Poisoning Threat hunters have detailed an ongoing campaign that leverages a malware loader called…

Hackerone logo
27
Jan
2025

Introducing HackerOne Automations | HackerOne

Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains…