Hackers allegedly stole $69M from cryptocurrency platform Phemex
27
Jan
2025

Hackers allegedly stole $69M from cryptocurrency platform Phemex

Attackers allegedly stole $69 million from cryptocurrency platform Phemex Pierluigi Paganini January 27, 2025 Crooks stole at least $69 million…

Hackerone logo
27
Jan
2025

Announcing Hai Plays: Personalize Your Playbook for Spot-On Security Advice

Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…

Cyber Espionage
27
Jan
2025

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated…

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
27
Jan
2025

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…

week in security
27
Jan
2025

A week in security (January 20 – January 26)

Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…

Hackerone logo
27
Jan
2025

The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

Learn more about bug bounty programs and how they work > The Growing Trend At HackerOne, we’ve observed a notable…

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
27
Jan
2025

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

Jan 27, 2025Ravie LakshmananMalware / SEO Poisoning Threat hunters have detailed an ongoing campaign that leverages a malware loader called…

Hackerone logo
27
Jan
2025

Introducing HackerOne Automations | HackerOne

Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains…

Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code
27
Jan
2025

Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code

Researchers have exposed a systemic vulnerability within the Windows operating system, leveraging its “Best-Fit” charset conversion feature to bypass security…

Naveen Goud
27
Jan
2025

Generative AI fuels more Cyber Crime

Artificial Intelligence (AI) has the potential to revolutionize various sectors, but when leveraged by malicious actors, it can lead to…

PowerSchool Data Breach Exposes 300,000+ Educators' Info
27
Jan
2025

PowerSchool Data Breach Exposes 300,000+ Educators’ Info

PowerSchool has shared new updates to last week’s cyberattack that targeted the personal information of over 300,000 teachers. The PowerSchool…

GitLab Security Update - Patch for Multiple Vulnerabilities
27
Jan
2025

GitLab Security Update – Patch for Multiple Vulnerabilities

Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…