As more services move ever cloud-wards, so too do thoughts by attackers as to how best exploit them. With all that…
Tag: exploits
A week in security (Oct 11 – Oct 17)
Last week on Malwarebytes Labs Other cybersecurity news Stay safe, everyone!
A week in security (Sept 20 – Sept 26)
Last week on Malwarebytes Labs Other cybersecurity news Stay safe, everyone!
A week in security (January 11 – January 17)
Last week on Malwarebytes Labs, we looked at IoT problems, Microsoft’s Patch Tuesday, and how cybercriminals want access to your cloud…
Keep Zoombombing cybercriminals from dropping a load on your meetings
While shelter in place has left many companies struggling to stay in business during the COVID-19 epidemic, one company in particular…
Windows 7 is EOL: What next?
End-of-life (EOL) is an expression commonly used by software vendors to indicate that a product or version of a product has…
A decade in cybersecurity fails: the top breaches, threats, and ‘whoopsies’ of the 2010s
This post was co-authored by Wendy Zamora and Chris Boyd. All opinions expressed belong to your mom. Back in the days…
Pulse VPN patched their vulnerability, but businesses are trailing behind
In April 2019, Pulse Secure published an advisory about a vulnerability in their software. In August, cybercriminals were massively scanning for…
New iOS exploit checkm8 allows permanent compromise of iPhones
UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the…
The Hidden Bee infection chain, part 1: the stegano pack
About a year ago, we described the Hidden Bee miner delivered by the Underminer Exploit Kit. Hidden Bee has a complex…