ALL POSTS SSNDOB stolen data marketplace shut down by global law enforcement operation Christopher Boyd June 8, 2022 0 Comments The United States Department of Justice has announced a major takedownof a criminal marketplace that traded Personally Identifiable Information (PII). Not… MakeMoney malvertising campaign adds fake update template Threat Intelligence Team June 8, 2022 0 Comments Malware authors and distributors are following the ebbs and flow of the threat landscape. One campaign we have tracked for a… Coffee app in hot water for constant tracking of user location Christopher Boyd June 8, 2022 0 Comments A mobile app violated Canada’s privacy lawsvia some pretty significant overreach with its tracking of device owners. The violation will apparently… Awful 4chan chat bot spouts racial slurs and antisemitic abuse Pieter Arntz June 8, 2022 0 Comments “A robot may not injure a human being or, through inaction, allow a human being to come to harm” Science fiction… Rotten apples banned from the App store Pieter Arntz June 7, 2022 0 Comments Apple’s App Review process may have received ill wishes from many benevolent developers, but Apple has now revealedhow effective it is… Hackers can take over accounts you haven’t even created yet Jovi Umawing June 7, 2022 0 Comments Account hijacking has sadly become a regular, everyday occurrence. But when it comes to hijacking accounts beforethey are even created? That’s… Tor’s (security) role in the future of the Internet, with Alec Muffett Malwarebytes Labs June 6, 2022 0 Comments Tor has a storied reputation in the world of online privacy. The open-source project lets people browse the Internet more anonymously… Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool David Ruiz June 6, 2022 0 Comments This blog is part of our live coverage from RSA Conference 2022:Prometheus—a ransomware build based on Thanos that locked up victims’… Microsoft Autopatch is here…but can you use it? Christopher Boyd June 6, 2022 0 Comments Updating endpoints on a network can be a daunting task. Testing before rollout can take time. Delays to patches going live… Previous 1 … 224 225 226 227 228 … 618 Next Contributors Threat Center Podcast Glossary Scams