ALL POSTS SMS authentication code includes ad: a very bad idea Christopher Boyd July 1, 2021 0 Comments SMS authentication codes are back in the news, and the word I’d use to summarise their reappearance is “embattled.”I can still… PrintNightmare 0-day can be used to take over Windows domain controllers Pieter Arntz July 1, 2021 0 Comments In a rush to be the first to publish a proof-of-concept (PoC), researchers have published a write-up and a demo exploit… Microsoft exec reveals “routine” secrecy orders from government investigators David Ruiz July 1, 2021 0 Comments Microsoft executive Tom Burt told Congressional lawmakers Wednesday that Federal law enforcement agencies send “routine” secret orders for customer information from… Second colossal LinkedIn “breach” in 3 months, almost all users affected Malwarebytes Labs June 30, 2021 0 Comments LinkedIn has reportedly been breached—again—following reports of a massive sale of information scraped from 500M LinkedIn user profiles in the underground… Police seize DoubleVPN data, servers, and domain David Ruiz June 30, 2021 0 Comments A coordinated effort between global law enforcement agencies—led by the Dutch National Police—shut down a VPN service that was advertised on… Babuk ransomware builder leaked following muddled “retirement” Pieter Arntz June 30, 2021 0 Comments In the last days of April 2021, the operators of Babuk ransomware announced they were going to focus on demanding a… Fired by algorithm: The future’s here and it’s a robot wearing a white collar Pieter Arntz June 29, 2021 0 Comments Black Mirror meets 1984. Imagine that your employer uses a bot to keep track of your “production level.” And when this… What is the WireGuard VPN protocol? Malwarebytes Labs June 28, 2021 0 Comments In layman’s terms, a VPN uses encryption to create a private online connection between a device and a VPN server. With… Lil’ skimmer, the Magecart impersonator Threat Intelligence Team June 28, 2021 0 Comments This blog post was authored by Jérôme SeguraA very common practice among criminals consists of mimicking legitimate infrastructure when registering new… Previous 1 … 293 294 295 296 297 … 620 Next Contributors Threat Center Podcast Glossary Scams