Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows
30
Jun
2025

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

A sophisticated new phishing campaign has emerged, leveraging obsolete Windows file formats and advanced evasion techniques to distribute the notorious…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
30
Jun
2025

Corpse-eating selfies, and other ways to trick scammers (Lock and Code S06E14)

This week on the Lock and Code podcast… There’s a unique counter response to romance scammers. Her name is Becky…

Iranian Cyberattacks on Defense, OT Networks
30
Jun
2025

U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure

Jun 30, 2025Ravie LakshmananCyber Attack / Critical Infrastructure U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of…

Defender for Office 365
30
Jun
2025

Microsoft Defender for Office 365 now blocks email bombing attacks

Microsoft says its Defender for Office 365 cloud-based email security suite will now automatically detect and block email bombing attacks….

New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries
30
Jun
2025

New Open-Source Tool From Microsoft to Analyze Malware Hidden Within Rust Binaries

Microsoft has released RIFT (Rust Identification and Function Tagging), a groundbreaking open-source tool designed to help cybersecurity analysts identify and…

Cryptocurrency Fraud Network
30
Jun
2025

Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects

Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more…

Switzerland says government data stolen in ransomware attack
30
Jun
2025

Switzerland says government data stolen in ransomware attack

The government in Switzerland is informing that sensitive information from various federal offices has been impacted by a ransomware attack…

Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely
30
Jun
2025

Multiple Critical Vulnerabilities in D-Link Routers Let Attackers Execute Arbitrary Code Remotely

Multiple critical vulnerabilities in D-Link router models could allow remote attackers to execute arbitrary code and gain unauthorized access to…

Fraudsters behind €460 million crypto scam arrested in Spain
30
Jun
2025

Fraudsters behind €460 million crypto scam arrested in Spain

Spanish authorities arrested five members of a criminal network responsible for laundering €460 million stolen through global cryptocurrency investment fraud…

US government warns of new Iran-linked cyber threats on critical infrastructure
30
Jun
2025

US government warns of new Iran-linked cyber threats on critical infrastructure

Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

Windows
30
Jun
2025

Microsoft warns of Windows update delays due to wrong timestamp

Microsoft has confirmed a new known issue causing delivery delays for June 2025 Windows security updates due to an incorrect…

2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability
30
Jun
2025

2100+ Citrix Servers Vulnerable to Actively Exploited Bypass Authentication Vulnerability

Over 2,100 vulnerable Citrix NetScaler servers remain exposed to active exploitation, despite patches being available for critical vulnerabilities that allow…