FBI Releases IOCs on Cyber Threats Exploiting Salesforce for Data Theft
The Federal Bureau of Investigation (FBI) has released a detailed flash advisory disclosing indicators of compromise (IOCs) and tactics used...
Read more →The Federal Bureau of Investigation (FBI) has released a detailed flash advisory disclosing indicators of compromise (IOCs) and tactics used...
Read more →Samsung’s September 2025 security updates for Android devices include a patch for a vulnerability that has been exploited in the...
Read more →In recent months, security teams have observed a significant increase in sophisticated phishing campaigns leveraging a newly discovered Phishing-as-a-Service (PhaaS)...
Read more →Analysis reveals that the developers behind the AppSuite-PDF and PDF Editor campaigns have abused at least 26 distinct code-signing certificates...
Read more →A new artificial intelligence (AI)-powered penetration testing tool linked to a China-based company has attracted nearly 11,000 downloads on the...
Read more →Microsoft has issued an official reminder that support for Windows 11 version 23H2 Home and Pro editions is set to...
Read more →Microsoft has issued an urgent reminder to enterprise and educational institutions worldwide about the impending end of support for Windows...
Read more →Last week on Malwarebytes Labs: Stay safe! We don’t just report on scams—we help detect them Cybersecurity risks should never...
Read more →Governments across the continent are increasingly championing the use of local, homegrown providers and tightening the rules on where the...
Read more →INC ransom group claimed the breach of Panama’s Ministry of Economy and Finance Pierluigi Paganini September 15, 2025 Panama’s Ministry...
Read more →A critical vulnerability affecting FlowiseAI’s Flowise platform has been disclosed, revealing a severe authentication bypass flaw that allows attackers to...
Read more →A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging...
Read more →