ALL POSTS Under the engineering hood: Why Malwarebytes chose WordPress as its CMS Matt Burgess October 17, 2025 0 Comments It might surprise some that a security company would choose WordPress as the backbone of its digital content operations. Here's what we considered when choosing it. Video call app Huddle01 exposed 600K+ user logs Pieter Arntz October 16, 2025 0 Comments Privacy left the chat. A misconfigured Kafka broker effectively undid the anonymity many users rely on. Mango discloses data breach at third-party provider Pieter Arntz October 16, 2025 0 Comments The fashion retailer says a breach at a marketing partner exposed limited contact details—but no financial data or passwords. Roku accused of selling children’s data to advertisers and brokers Danny Bradbury October 16, 2025 0 Comments Florida claims Roku ignored clear signs its users were minors, collecting and selling viewing habits, voice recordings and precise locations. TikTok scam sells you access to your own fake money Stefan Dasic October 15, 2025 0 Comments We dive into the “last goodbye” messages sent via TikTok that lead victims to a crypto paywall scam. Scammers are still sending us their fake Robinhood security alerts Pieter Arntz October 15, 2025 0 Comments Fake alerts claim your Robinhood account is at risk. The link leads to a convincing copy of the site—but it’s built to steal your login. Satellites leak voice calls, text messages and more Pieter Arntz October 15, 2025 0 Comments Scientists have revealed a gaping hole in global telecom security, intercepting personal and business data from geostationary satellites. AI-driven scams are preying on Gen Z’s digital lives Malwarebytes Labs October 14, 2025 0 Comments Gone are the days when extortion was only the plot line of crime dramas—today, these threatening tactics target anyone with a smartphone, especially Gen Z. Pixel-stealing “Pixnapping” attack targets Android devices Pieter Arntz October 14, 2025 0 Comments Imagine if a rogue app could glimpse tiny bits of your screen—even the parts you thought were secure, like your 2FA codes. Previous 1 … 36 37 38 39 40 … 617 Next Contributors Threat Center Podcast Glossary Scams