Cybercriminals Exploit Inferno Drainer to Misappropriate $43K from CoinMarketCap Users
Scammers have leveraged a sophisticated tool known as Inferno Drainer to illicitly acquire approximately $43,000 in cryptocurrency from 110 users of CoinMarketCap. This was executed through the integration of…
Scammers have leveraged a sophisticated tool known as Inferno Drainer to illicitly acquire approximately $43,000 in cryptocurrency from 110 users of CoinMarketCap. This was executed through the integration of…
CoinMarketCap Experiences Security Breach Resulting in Cryptocurrency Wallet Exploitation through Deceptive Web3 Pop-up
CoinMarketCap, a leading cryptocurrency price tracking platform, experienced a significant security breach that resulted in the unauthorized draining of crypto wallets from unsuspecting visitors. On January 20, 2025, users…
CoinMarketCap, a leading cryptocurrency price tracking platform, experienced a significant security breach that resulted in the unauthorized draining of crypto wallets from unsuspecting visitors. On January 20, 2025, users…
Cyber Essentials Achieves Record Quarterly Milestone in Certifications
The UK government’s flagship cyber-resilience initiative has reached a significant milestone, with quarterly certifications for the Cyber Essentials scheme surpassing the 10,000 mark for the first time. This achievement,…
The UK government’s flagship cyber-resilience initiative has reached a significant milestone, with quarterly certifications for the Cyber Essentials scheme surpassing the 10,000 mark for the first time. This achievement,…
The Risks Associated with Storing Sensitive Data on Network Shares
Are you currently utilizing a shared network drive for storing sensitive information? If so, it is critical to recognize that your organization may be exposed to substantial risks involving…
Are you currently utilizing a shared network drive for storing sensitive information? If so, it is critical to recognize that your organization may be exposed to substantial risks involving…
Gmail’s Multi-Factor Authentication Compromised by Cybercriminals in Targeted Assaults
Russian hackers have successfully circumvented Google’s multi-factor authentication (MFA) in Gmail to execute targeted attacks. This finding comes from security researchers at the Google Threat Intelligence Group (GTIG).
The…
Russian hackers have successfully circumvented Google’s multi-factor authentication (MFA) in Gmail to execute targeted attacks. This finding comes from security researchers at the Google Threat Intelligence Group (GTIG).
The…
U.S. Homeland Security Issues Advisory on Increasing Cyber Threats from Iranian Actors
The U.S. Department of Homeland Security (DHS) has issued a warning regarding the increasing risks of cyberattacks from Iranian-backed hacking groups and pro-Iranian hacktivists. This alert comes as part…
The U.S. Department of Homeland Security (DHS) has issued a warning regarding the increasing risks of cyberattacks from Iranian-backed hacking groups and pro-Iranian hacktivists. This alert comes as part…
Exploiting Echo Chamber Vulnerabilities in LLMs: Risks of Generating Malicious Content in OpenAI and Google Systems
Cybersecurity researchers are raising awareness about an innovative jailbreaking technique known as Echo Chamber. This method has the potential to deceive popular large language models (LLMs) into generating inappropriate…
Cybersecurity researchers are raising awareness about an innovative jailbreaking technique known as Echo Chamber. This method has the potential to deceive popular large language models (LLMs) into generating inappropriate…
Cyber Fattah Exposes Data from Saudi Games in Suspected Iranian Operation
Thousands of personal records linked to athletes and attendees of the Saudi Games have been compromised due to a cyber-attack attributed to the pro-Iranian hacktivist group known as Cyber…
Thousands of personal records linked to athletes and attendees of the Saudi Games have been compromised due to a cyber-attack attributed to the pro-Iranian hacktivist group known as Cyber…
Potential Asymmetric Warfare by a Militarily Degraded Iran: Implications for Proxy and Cyber Threats
Israel’s air assault on Iran has concentrated primarily on diminishing the Islamic Republic’s military capabilities and potential nuclear development. Actions taken in recent operations have successfully affected Iran’s ability…
Israel’s air assault on Iran has concentrated primarily on diminishing the Islamic Republic’s military capabilities and potential nuclear development. Actions taken in recent operations have successfully affected Iran’s ability…
Salt Typhoon Exploits Router Vulnerabilities to Target Telecommunications: Alert Issued by FBI and Canadian Authorities
A recently released advisory from the FBI and Canadian authorities highlights the activities of a China-linked group known as Salt Typhoon. This actor has been identified as exploiting vulnerabilities…
A recently released advisory from the FBI and Canadian authorities highlights the activities of a China-linked group known as Salt Typhoon. This actor has been identified as exploiting vulnerabilities…
Weekly Security Update: June 15 – June 21
In the recent updates from Malwarebytes Labs, several significant topics have emerged in the information security landscape:
- Discussion surrounding the impacts of social media on children prompted a…
In the recent updates from Malwarebytes Labs, several significant topics have emerged in the information security landscape:
- Discussion surrounding the impacts of social media on children prompted a…
Malware Discovered on Google Play and Apple App Store: Compromising Personal Photos and Cryptocurrency Assets
A recently identified mobile malware, known as SparkKitty, has been found on both Google Play and Apple App Store, specifically targeting Android and iOS devices. This advanced malware is…
A recently identified mobile malware, known as SparkKitty, has been found on both Google Play and Apple App Store, specifically targeting Android and iOS devices. This advanced malware is…
China-Linked Salt Typhoon Exploits Critical Cisco Vulnerability to Compromise Canadian Telecommunications Sector
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory regarding cyber attacks conducted by the China-linked Salt Typhoon actors. These…
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory regarding cyber attacks conducted by the China-linked Salt Typhoon actors. These…
Cyber Intelligence Professionals and Enthusiasts Now Have the Ability to Report Threats Anonymously
Imagine a landscape where cybersecurity professionals, enthusiasts, or whistleblowers can anonymously report new clusters of malicious cyber activity without enduring extensive and formal disclosure procedures. This vision is being…
Imagine a landscape where cybersecurity professionals, enthusiasts, or whistleblowers can anonymously report new clusters of malicious cyber activity without enduring extensive and formal disclosure procedures. This vision is being…
Pro-Russian Cyber Actors Target Dutch Government Websites in Anticipation of NATO Summit
On Monday morning, an online platform utilized by Dutch municipalities and provinces for the dissemination of official documents appears to have been subjected to a digital attack, as reported…
On Monday morning, an online platform utilized by Dutch municipalities and provinces for the dissemination of official documents appears to have been subjected to a digital attack, as reported…
Chinese-Linked LapDogs Campaign Deploys ShortLeash Backdoor Utilizing Counterfeit Certificates
The ShortLeash backdoor, identified as a critical component of the China-linked LapDogs campaign since 2023, facilitates covert access, sustained presence, and data exfiltration through compromised small office/home office (SOHO)…
The ShortLeash backdoor, identified as a critical component of the China-linked LapDogs campaign since 2023, facilitates covert access, sustained presence, and data exfiltration through compromised small office/home office (SOHO)…
McLaren Health Care Reports Data Breach Affecting 743,000 Patients
McLaren Health Care has alerted approximately 743,000 patients regarding a significant data breach linked to a ransomware attack perpetrated by the INC group in July 2024.
The breach was…
McLaren Health Care has alerted approximately 743,000 patients regarding a significant data breach linked to a ransomware attack perpetrated by the INC group in July 2024.
The breach was…
Strategic Disruption of Cryptomining Campaigns Utilizing Malicious Share Techniques and XMRogue Insights
Cybersecurity researchers have identified two innovative techniques that can effectively disrupt cryptocurrency mining botnets. These methods exploit the inherent design of prevalent mining topologies, aiming to halt the mining…
Cybersecurity researchers have identified two innovative techniques that can effectively disrupt cryptocurrency mining botnets. These methods exploit the inherent design of prevalent mining topologies, aiming to halt the mining…
Insights from Helsinki: NCSC-FI’s Contribution to Mitigating a Major Data Breach
A data breach in 2024 that affected Helsinki, Finland’s capital and largest employer, exposed sensitive personal data of over 300,000 individuals, providing significant lessons for cybersecurity professionals.
This incident…
A data breach in 2024 that affected Helsinki, Finland’s capital and largest employer, exposed sensitive personal data of over 300,000 individuals, providing significant lessons for cybersecurity professionals.
This incident…
Marquette County Medical Care Facility Announces Data Breach Disclosure
Marquette County Medical Care Facility (MCMCF) has reported a data breach that was identified in March 2025. On March 3, 2025, MCMCF recognized an incident of business email compromise…
Marquette County Medical Care Facility (MCMCF) has reported a data breach that was identified in March 2025. On March 3, 2025, MCMCF recognized an incident of business email compromise…