ALL POSTS Google will pay $8.25m to settle child data-tracking allegations Danny Bradbury January 20, 2026 0 Comments Google-owned AdMob allegedly collected kids' data for ads without parental consent—including IP addresses, usage data, and exact locations. Firefox joins Chrome and Edge as sleeper extensions spy on users Pieter Arntz January 19, 2026 0 Comments Researchers found more sleeper browser extensions that spy on users and install backdoors, this time targeting Firefox users as well. A week in security (January 12 – January 18) Malwarebytes Labs January 19, 2026 0 Comments Last week on Malwarebytes Labs: Stay safe! WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping Pieter Arntz January 16, 2026 0 Comments Researchers demonstrated WhisperPair, a set of attacks that can take control of many widely used Bluetooth earbuds and headphones without user interaction. Dutch police sell fake tickets to show how easily scams work Danny Bradbury January 16, 2026 0 Comments A fake ticket website that ended with a digital finger-wag showed just how many people still fall for concert and sports ticket scams. “Reprompt” attack lets attackers steal data from Microsoft Copilot Pieter Arntz January 15, 2026 0 Comments Researchers uncovered a way to steal data from Microsoft Copilot users with a single malicious link. Phishing scammers are posting fake “account restricted” comments on LinkedIn Pieter Arntz January 14, 2026 0 Comments Fake LinkedIn comments warning of account restrictions are designed to trick users into revealing their login details. Online shoppers at risk as Magecart skimming hits major payment networks Pieter Arntz January 14, 2026 0 Comments A Magecart campaign is skimming card data from online checkouts tied to major payment networks, including AmEx, Diners Club, and Mastercard. How real software downloads can hide remote backdoors Stefan Dasic January 14, 2026 0 Comments Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example. Previous 1 2 3 4 5 … 599 Next Contributors Threat Center Podcast Glossary Scams