Gmail’s Multi-Factor Authentication Compromised by Cybercriminals in Targeted Assaults
Russian hackers have successfully circumvented Google’s multi-factor authentication (MFA) in Gmail to execute targeted attacks. This finding comes from security researchers at the Google Threat Intelligence Group (GTIG).
The…
Russian hackers have successfully circumvented Google’s multi-factor authentication (MFA) in Gmail to execute targeted attacks. This finding comes from security researchers at the Google Threat Intelligence Group (GTIG).
The…
U.S. Homeland Security Issues Advisory on Increasing Cyber Threats from Iranian Actors
The U.S. Department of Homeland Security (DHS) has issued a warning regarding the increasing risks of cyberattacks from Iranian-backed hacking groups and pro-Iranian hacktivists. This alert comes as part…
The U.S. Department of Homeland Security (DHS) has issued a warning regarding the increasing risks of cyberattacks from Iranian-backed hacking groups and pro-Iranian hacktivists. This alert comes as part…
Exploiting Echo Chamber Vulnerabilities in LLMs: Risks of Generating Malicious Content in OpenAI and Google Systems
Cybersecurity researchers are raising awareness about an innovative jailbreaking technique known as Echo Chamber. This method has the potential to deceive popular large language models (LLMs) into generating inappropriate…
Cybersecurity researchers are raising awareness about an innovative jailbreaking technique known as Echo Chamber. This method has the potential to deceive popular large language models (LLMs) into generating inappropriate…
Cyber Fattah Exposes Data from Saudi Games in Suspected Iranian Operation
Thousands of personal records linked to athletes and attendees of the Saudi Games have been compromised due to a cyber-attack attributed to the pro-Iranian hacktivist group known as Cyber…
Thousands of personal records linked to athletes and attendees of the Saudi Games have been compromised due to a cyber-attack attributed to the pro-Iranian hacktivist group known as Cyber…
Potential Asymmetric Warfare by a Militarily Degraded Iran: Implications for Proxy and Cyber Threats
Israel’s air assault on Iran has concentrated primarily on diminishing the Islamic Republic’s military capabilities and potential nuclear development. Actions taken in recent operations have successfully affected Iran’s ability…
Israel’s air assault on Iran has concentrated primarily on diminishing the Islamic Republic’s military capabilities and potential nuclear development. Actions taken in recent operations have successfully affected Iran’s ability…
Salt Typhoon Exploits Router Vulnerabilities to Target Telecommunications: Alert Issued by FBI and Canadian Authorities
A recently released advisory from the FBI and Canadian authorities highlights the activities of a China-linked group known as Salt Typhoon. This actor has been identified as exploiting vulnerabilities…
A recently released advisory from the FBI and Canadian authorities highlights the activities of a China-linked group known as Salt Typhoon. This actor has been identified as exploiting vulnerabilities…
Weekly Security Update: June 15 – June 21
In the recent updates from Malwarebytes Labs, several significant topics have emerged in the information security landscape:
- Discussion surrounding the impacts of social media on children prompted a…
In the recent updates from Malwarebytes Labs, several significant topics have emerged in the information security landscape:
- Discussion surrounding the impacts of social media on children prompted a…
Malware Discovered on Google Play and Apple App Store: Compromising Personal Photos and Cryptocurrency Assets
A recently identified mobile malware, known as SparkKitty, has been found on both Google Play and Apple App Store, specifically targeting Android and iOS devices. This advanced malware is…
A recently identified mobile malware, known as SparkKitty, has been found on both Google Play and Apple App Store, specifically targeting Android and iOS devices. This advanced malware is…
China-Linked Salt Typhoon Exploits Critical Cisco Vulnerability to Compromise Canadian Telecommunications Sector
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory regarding cyber attacks conducted by the China-linked Salt Typhoon actors. These…
The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory regarding cyber attacks conducted by the China-linked Salt Typhoon actors. These…
Cyber Intelligence Professionals and Enthusiasts Now Have the Ability to Report Threats Anonymously
Imagine a landscape where cybersecurity professionals, enthusiasts, or whistleblowers can anonymously report new clusters of malicious cyber activity without enduring extensive and formal disclosure procedures. This vision is being…
Imagine a landscape where cybersecurity professionals, enthusiasts, or whistleblowers can anonymously report new clusters of malicious cyber activity without enduring extensive and formal disclosure procedures. This vision is being…
Pro-Russian Cyber Actors Target Dutch Government Websites in Anticipation of NATO Summit
On Monday morning, an online platform utilized by Dutch municipalities and provinces for the dissemination of official documents appears to have been subjected to a digital attack, as reported…
On Monday morning, an online platform utilized by Dutch municipalities and provinces for the dissemination of official documents appears to have been subjected to a digital attack, as reported…
Chinese-Linked LapDogs Campaign Deploys ShortLeash Backdoor Utilizing Counterfeit Certificates
The ShortLeash backdoor, identified as a critical component of the China-linked LapDogs campaign since 2023, facilitates covert access, sustained presence, and data exfiltration through compromised small office/home office (SOHO)…
The ShortLeash backdoor, identified as a critical component of the China-linked LapDogs campaign since 2023, facilitates covert access, sustained presence, and data exfiltration through compromised small office/home office (SOHO)…
McLaren Health Care Reports Data Breach Affecting 743,000 Patients
McLaren Health Care has alerted approximately 743,000 patients regarding a significant data breach linked to a ransomware attack perpetrated by the INC group in July 2024.
The breach was…
McLaren Health Care has alerted approximately 743,000 patients regarding a significant data breach linked to a ransomware attack perpetrated by the INC group in July 2024.
The breach was…
Strategic Disruption of Cryptomining Campaigns Utilizing Malicious Share Techniques and XMRogue Insights
Cybersecurity researchers have identified two innovative techniques that can effectively disrupt cryptocurrency mining botnets. These methods exploit the inherent design of prevalent mining topologies, aiming to halt the mining…
Cybersecurity researchers have identified two innovative techniques that can effectively disrupt cryptocurrency mining botnets. These methods exploit the inherent design of prevalent mining topologies, aiming to halt the mining…
Insights from Helsinki: NCSC-FI’s Contribution to Mitigating a Major Data Breach
A data breach in 2024 that affected Helsinki, Finland’s capital and largest employer, exposed sensitive personal data of over 300,000 individuals, providing significant lessons for cybersecurity professionals.
This incident…
A data breach in 2024 that affected Helsinki, Finland’s capital and largest employer, exposed sensitive personal data of over 300,000 individuals, providing significant lessons for cybersecurity professionals.
This incident…
Marquette County Medical Care Facility Announces Data Breach Disclosure
Marquette County Medical Care Facility (MCMCF) has reported a data breach that was identified in March 2025. On March 3, 2025, MCMCF recognized an incident of business email compromise…
Marquette County Medical Care Facility (MCMCF) has reported a data breach that was identified in March 2025. On March 3, 2025, MCMCF recognized an incident of business email compromise…
SparkKitty Spyware Discovered on App Store and Play Store: Compromising Personal Photos for Cryptocurrency Data Theft
Kaspersky has identified a new spyware threat known as SparkKitty, which has infiltrated both the Apple App Store and Google Play. This sophisticated malware is designed to steal sensitive…
Kaspersky has identified a new spyware threat known as SparkKitty, which has infiltrated both the Apple App Store and Google Play. This sophisticated malware is designed to steal sensitive…
Thousands of Private Camera Feeds Exposed Online: Ensure Your Security is Intact
If you have internet-connected cameras in or around your home, it is crucial to review their settings. Recent research has uncovered over 40,000 cameras exposing images of residential and…
If you have internet-connected cameras in or around your home, it is crucial to review their settings. Recent research has uncovered over 40,000 cameras exposing images of residential and…
Google Launches Imagen 4: Advanced Text-to-Image Model Now Available at No Cost
Google has introduced Imagen 4, its advanced text-to-image model, which is now available for free exclusively on AI Studio. This release represents a significant upgrade from previous versions, enhancing…
Google has introduced Imagen 4, its advanced text-to-image model, which is now available for free exclusively on AI Studio. This release represents a significant upgrade from previous versions, enhancing…
U.S. Visa Regulation Mandates Public Access to Social Media Accounts for Applicants
The United States Embassy in India has announced a significant update for applicants seeking F, M, and J nonimmigrant visas, advising that social media accounts should be made public.…
The United States Embassy in India has announced a significant update for applicants seeking F, M, and J nonimmigrant visas, advising that social media accounts should be made public.…