Citrix UberAgent Flaw Let Attackers Elevate Privileges
22
Apr
2024

Citrix UberAgent Flaw Let Attackers Elevate Privileges

A significant vulnerability has been identified in Citrix’s monitoring tool, uberAgent. If exploited, this flaw could allow attackers to escalate…

Repeat Ransomware attacks on 78% of victims who pay
22
Apr
2024

More companies refuse to pay ransom in 2024

In 2024, a significant shift in corporate response to ransomware attacks has emerged, reflecting a resolute stance against capitulation to…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
22
Apr
2024

Picking fights and gaining rights, with Justin Brookman: Lock and Code S05E09

This week on the Lock and Code podcast… Our Lock and Code host, David Ruiz, has a bit of an…

Russian Hacker Group ToddyCat
22
Apr
2024

Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft

Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a wide range…

Synlab Italia suspends operations following ransomware attack
22
Apr
2024

Synlab Italia suspends operations following ransomware attack

Synlab Italia has suspended all its medical diagnostic and testing services after a ransomware attack forced its IT systems to…

ToddyCat APT Hackers Deploy Multiple Tools to Hijack Network Infrastructure
22
Apr
2024

ToddyCat APT Hackers Deploy Multiple Tools to Hijack Network

Advanced Persistent Threat (APT) group known as ToddyCat, new insights have emerged regarding their sophisticated methods of hijacking network infrastructure to steal sensitive data from governmental organizations across the Asia-Pacific region. This…

Weaponized Zip Files That Deliver WINELOADER Malware
22
Apr
2024

Weaponized Zip Files That Deliver WINELOADER Malware

APT29, a Russian threat group, targeted German political parties with a new backdoor called WINELOADER using spear-phishing emails containing malicious…

GPT-4 Is Capable Of Exploiting 87% Of One-Day Vulnerabilities
22
Apr
2024

GPT-4 Is Capable Of Exploiting 87% Of One-Day Vulnerabilities

Large language models (LLMs) have achieved superhuman performance on many benchmarks, leading to a surge of interest in LLM agents…

Crafting AI’s Future: Decoding the AI Executive Order
22
Apr
2024

Crafting AI’s Future: Decoding the AI Executive Order

By: Rajat Kohli, Partner at Zinnov There is something to be learned from epic fantasy productions like Harry Potter. That…

Malicious PyPI Package Attacking Discord Users
22
Apr
2024

Malicious PyPI Package Attacking Discord Users

Hackers often target PyPI packages to exploit vulnerabilities and inject malicious code into widely used Python libraries. Recently, cybersecurity researchers…

48 Vulnerabilities Uncovered In AI systems : Surge By 220%
22
Apr
2024

48 Vulnerabilities Uncovered In AI systems : Surge By 220%

Since the initial disclosure of 15 vulnerabilities in November 2023, a 220% increase in vulnerabilities impacting AI systems has been…

Crushftp Zero-day Update
22
Apr
2024

Hackers Group Claims To Have Broke Into IDF

Anonymous claims a successful cyberattack against the Israeli Defence Force (IDF), gaining access to 20 gigabytes of data, which allegedly…