How to make developer self-service succeed
15
Dec
2025

How to make developer self-service succeed

The aim for all software developer team leaders is to find a happy place where developers spend their day developing…

report-ad-banner
15
Dec
2025

Japan Holds First Public-Private Cybersecurity Drill

Japan is set to hold its first public-private sector tabletop exercise to prepare for large-scale cyberattacks, particularly targeting critical infrastructure….

NVIDIA Merlin Vulnerabilities Allows Malicious Code Execution and DoS Attacks
15
Dec
2025

NVIDIA Merlin Vulnerabilities Allows Malicious Code Execution and DoS Attacks

NVIDIA has released urgent security patches for its Merlin machine learning framework after discovering two high-severity deserialization vulnerabilities that could…

week in security
15
Dec
2025

A week in security (December 8 – December 14)

Last week on Malwarebytes Labs: On the ThreatDown blog: Stay safe! We don’t just report on threats—we help safeguard your…

report-ad-banner
15
Dec
2025

The Execution Playbook For Indian Companies

Shashank Bajpai, CISO & CTSO at Yotta 2026 is the execution year for India’s Digital Personal Data Protection (DPDP) regime…

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution
15
Dec
2025

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code…

New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems
15
Dec
2025

New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems

CyberVolk, a pro-Russia hacktivist group first documented in late 2024, has resurfaced with a sophisticated ransomware-as-a-service (RaaS) offering called VolkLocker…

Prometheus: Open-source metrics and monitoring systems and services
15
Dec
2025

Prometheus: Open-source metrics and monitoring systems and services

Prometheus is an open-source monitoring and alerting system built for environments where services change often and failures can spread fast….

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation
15
Dec
2025

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

A critical vulnerability affecting Sierra Wireless routers has been added to its Known Exploited Vulnerabilities (KEV) catalog. This decision comes…

EDR Process Sideloading to Conceal Malicious Activity
15
Dec
2025

EDR Process Sideloading to Conceal Malicious Activity

Initial access broker Storm-0249 has evolved from a mass phishing operation into a sophisticated threat actor weaponizing legitimate Endpoint Detection…

How researchers are teaching AI agents to ask for permission the right way
15
Dec
2025

How researchers are teaching AI agents to ask for permission the right way

People are starting to hand more decisions to AI agents, from booking trips to sorting digital files. The idea sounds…

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
15
Dec
2025

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Dec 15, 2025Ravie LakshmananRansomware / Cybercrime The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new…