Chrome in the zero-day crosshairs
Credit to Author: Kaspersky Team| Date: Mon, 04 Nov 2019 16:23:32 +0000
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Read moreCredit to Author: Kaspersky Team| Date: Mon, 04 Nov 2019 16:23:32 +0000
A Chrome vulnerability already exploited by attackers gets patched. We recommend updating your browser right now.
Read moreCredit to Author: Bharat Mistry| Date: Thu, 24 Oct 2019 16:35:26 +0000
Most organisations see supply chains as providers of physical goods and services. The supply chain management function in these companies usually provides the governance framework to reduce third-party risks and prevent hackers from stealing data, disrupting daily operations and affecting business continuity. But there’s another crucial part of this ecosystem which some organisations may be…
The post A New Playground for Cybercrime: Why Supply Chain Security Must Cover Software Development appeared first on .
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 21 Oct 2019 15:45:45 +0000
Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram. Categories: Tags: amazonDark Webdomestic abusedomestic abuse survivordomestic abuse survivorsdomestic violencefacebookfacial recognitionInstagramjackpotjackpottingkindleMark Zuckerbergnational cybersecurity awareness monthNational domestic violence awareness monthOraclepasswordpasswordsphishphishingphishing scamransomwaretorTor browserUS Customs and Border Enforcementvpnvulnerabilitiesvulnerability |
The post A week in security (October 14 – 20) appeared first on Malwarebytes Labs.
Read moreCredit to Author: Pieter Arntz| Date: Fri, 18 Oct 2019 16:36:36 +0000
After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up? Categories: Tags: cybercriminalsexploitexploit kitsexploitspatchpatchingpulsevpnvulnerabilitiesvulnerability |
The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.
Read moreCredit to Author: Andrey Pozhogin| Date: Wed, 09 Oct 2019 20:04:50 +0000
Contrary to common belief, public clouds are not highly secure by design, and so require additional protection.
Read moreCredit to Author: Christopher Boyd| Date: Tue, 24 Sep 2019 17:19:23 +0000
We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out. Categories: Tags: camcameradeviceshackershackinghubInternet of ThingsIoTIoT devicesmonitorsecurity by designvulnerabilitieswebcamwebcam hacks |
The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.
Read moreCredit to Author: Vasilios Hioureas| Date: Fri, 13 Sep 2019 20:44:52 +0000
When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks. Categories: Tags: amazonawsAWS bucketsdatahackingIntelintelligence gatheringopen source intelligenceOSINTpen-testingpenetration testingreconreconnaisancevulnerabilities |
The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.
Read moreCredit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Mon, 12 Aug 2019 15:11:56 +0000
[Lightly edited transcript of the video above] Hi there, Mark Nunnikhoven from Trend Micro Research, I want to talk to you about the concept of lateral movement. And the reason why I want to tackle this today is because I’ve had some conversations in the last few days that have really kind of hit that…
The post Cyberattack Lateral Movement Explained appeared first on .
Read more