Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns….
The UK government’s decision to designate datacentres as critical national infrastructure (CNI) in September 2024 signalled its ambition to build…
Attackers allegedly stole $69 million from cryptocurrency platform Phemex Pierluigi Paganini January 27, 2025 Crooks stole at least $69 million…
Take Precision to the Next Level—Beyond Basic AI Efficiency and precision are critical in every operation. However, many security teams…
Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated…
A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…
Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…
Learn more about bug bounty programs and how they work > The Growing Trend At HackerOne, we’ve observed a notable…
Jan 27, 2025Ravie LakshmananMalware / SEO Poisoning Threat hunters have detailed an ongoing campaign that leverages a malware loader called…
Efficiency and accuracy are crucial in vulnerability remediation. Yet, repetitive and manual handling of tasks throughout the vulnerability lifecycle remains…
Researchers have exposed a systemic vulnerability within the Windows operating system, leveraging its “Best-Fit” charset conversion feature to bypass security…
Artificial Intelligence (AI) has the potential to revolutionize various sectors, but when leveraged by malicious actors, it can lead to…











