The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
25
Aug
2025

How a scam hunter got scammed (Lock and Code S06E17)

This week on the Lock and Code podcast… If there’s one thing that scam hunter Julie-Anne Kearns wants everyone to…

US to take 10 percent equity stake in Intel
25
Aug
2025

US to take 10 percent equity stake in Intel

US President Donald Trump said the US would take a 10 percent stake in Intel under a deal with the…

Databricks to buy Tecton in AI agent push
25
Aug
2025

Databricks to buy Tecton in AI agent push

Databricks will acquire machine learning startup Tecton to expand its AI agent offerings, the latest in a string of deals…

Defence's ERP bill with IBM hits $575m
25
Aug
2025

Defence’s ERP bill with IBM hits $575m

The Department of Defence has inked a fresh agreement with IBM related to its enterprise resource planning (ERP) overhaul, bringing…

ANZ eyes 'compound' gains from GenAI
25
Aug
2025

ANZ eyes ‘compound’ gains from GenAI

ANZ Banking Group is realising incremental benefits from adopting generative AI across its IT service desk environment despite initial misgivings…

UGL digitised work order planning after winning electricity contract
25
Aug
2025

UGL digitised work order planning after winning electricity contract

Engineering services firm UGL has built a digital work order management system, initially to help field service teams working on…

CTM360 Report Explains How Emotions Fuel Modern Fraud
24
Aug
2025

CTM360 Report Explains How Emotions Fuel Modern Fraud

CTM360 research reveals how scammers hook their victims through manipulative traps built on AI, stolen data, and brand impersonation. These…

Empowering The Soc: Stop Detecting Potential Threats, Start Signaling Real Attacks
24
Aug
2025

Empowering The Soc: Stop Detecting Potential Threats, Start Signaling Real Attacks

The cybersecurity landscape is constantly evolving, and security operations centers (SOCs) are feeling the pressure to stay ahead of increasingly…

SSH Brute-Force Tool
24
Aug
2025

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

Aug 24, 2025Ravie LakshmananMalware / Supply Chain Security Cybersecurity researchers have discovered a malicious Go module that presents itself as…

Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation
24
Aug
2025

Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation

The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a…

SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 42
24
Aug
2025

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 59

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware…

The return of the Mirai-based Gayfemboy Botnet
24
Aug
2025

The return of the Mirai-based Gayfemboy Botnet

IoT under siege: The return of the Mirai-based Gayfemboy Botnet Pierluigi Paganini August 24, 2025 Mirai-based Gayfemboy botnet resurfaces, evolving…