Smart manufacturing demands workers with AI and cybersecurity skills
25
Aug
2025

Smart manufacturing demands workers with AI and cybersecurity skills

The manufacturing sector is entering a new phase of digital transformation. According to Rockwell Automation’s 10th Annual State of Smart…

week in security
25
Aug
2025

A week in security (August 18 – August 24)

Last week on Malwarebytes Labs: Stay safe! We don’t just report on threats – we help protect your social media…

25
Aug
2025

Hackers Steal Windows Secrets and Credentials Undetected by EDR Detection

A cybersecurity researcher has unveiled a sophisticated new method for extracting Windows credentials and secrets that successfully evades detection by…

Why satellite cybersecurity threats matter to everyone
25
Aug
2025

Why satellite cybersecurity threats matter to everyone

Satellites play a huge role in our daily lives, supporting everything from global communications to navigation, business, and national security….

PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability
25
Aug
2025

PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability

A critical zero-click remote code execution vulnerability in Apple’s iOS has been disclosed with a working proof-of-concept exploit, marking another…

Why a new AI tool could change how we test insider threat defenses
25
Aug
2025

Why a new AI tool could change how we test insider threat defenses

Insider threats are among the hardest attacks to detect because they come from people who already have legitimate access. Security…

KorPlug Malware Unmasked - TTPs, Control Flow, IOCs Exposed
25
Aug
2025

KorPlug Malware Unmasked – TTPs, Control Flow, IOCs Exposed

A sophisticated malware strain known as KorPlug has emerged as a significant threat in the cybersecurity landscape, employing advanced obfuscation…

Critical Tableau Server Flaws Allows Malicious File Uploads
25
Aug
2025

Critical Tableau Server Flaws Allows Malicious File Uploads

Salesforce has addressed multiple critical security vulnerabilities in Tableau Server and Desktop that could enable attackers to upload malicious files…

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux
25
Aug
2025

Kopia: Open-source encrypted backup tool for Windows, macOS, Linux

Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them…

Telstra to lead My Health Record data architecture overhaul
25
Aug
2025

Telstra to lead My Health Record data architecture overhaul

Telstra’s digital health arm has won a $33.2 million contract to implement a new data architecture for the government’s My…

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies
25
Aug
2025

Review: Adversarial AI Attacks, Mitigations, and Defense Strategies

Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. It’s…

New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies
25
Aug
2025

New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies

Microsoft is rolling out a significant new administrative control feature in mid-September 2025 that will enable IT administrators to manage…