Cybercriminal Crypto Transactions Surge to 2025 High
12
Jan
2026

Cybercriminal Crypto Transactions Surge to 2025 High

Illicit cryptocurrency transactions reached unprecedented levels in 2025 as nation-states weaponized digital assets to evade sanctions, transforming the cybercrime landscape…

Debian 13.3 is now available with targeted corrections, updates
12
Jan
2026

Debian 13.3 is now available with targeted corrections, updates

Debian 13.3 is the third maintenance update for the stable Debian 13 distribution, codenamed “trixie”. It updates package content to…

Auditing, classifying and building a data sovereignty strategy
12
Jan
2026

Auditing, classifying and building a data sovereignty strategy

Data sovereignty is a hot topic. For commercial and public sector organisations, compliance to ensure personal data is secure is…

Claude
12
Jan
2026

Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools

Anthropic is bringing Claude for healthcare, following a similar move by OpenAI for ChatGPT. In a blog post, Anthropic explained that…

Everest Hacking Group Allegedly Claims Breach of Nissan Motors
12
Jan
2026

Everest Hacking Group Allegedly Claims Breach of Nissan Motors

Everest hacking group has allegedly claimed a major breach of Nissan Motor Co., Ltd., raising fresh concerns about data security…

Stealth Intrusions Aimed at Financial Data Exfiltration
12
Jan
2026

Stealth Intrusions Aimed at Financial Data Exfiltration

A sophisticated second-stage malware payload known as ValleyRAT_S2 has emerged as a critical threat to organizations across Chinese-speaking regions, including…

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud
12
Jan
2026

Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud

Cybersecurity researchers have shed light on two service providers that supply online criminal networks with the necessary tools and infrastructure…

Kyowon Group cyberattack
12
Jan
2026

Systems Down, Data Under Review

A Kyowon Group cyberattack has just been revealed, making the incident one of the latest breaches affecting South Korean companies…

ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details
12
Jan
2026

ValleyRAT_S2 Attacking Organizations to Deploy Stealthy Malware and Extract Financial Details

A new wave of attacks is using the ValleyRAT_S2 malware to quietly break into organizations, stay hidden for long periods,…

Hacking Group “Everest” Allegedly Claims Nissan Motor Breach
12
Jan
2026

Hacking Group “Everest” Allegedly Claims Nissan Motor Breach

The Everest hacking group has allegedly claimed responsibility for a major cyberattack on Nissan Motor Co., Ltd., one of Japan’s…

Downtime pushes resilience planning into security operations
12
Jan
2026

Downtime pushes resilience planning into security operations

CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs…

week in security
12
Jan
2026

A week in security (January 5 – January 11)

Last week on Malwarebytes Labs: Stay safe! We don’t just report on privacy—we offer you the option to use it….