In the current threat landscape, the relationship between cyber-insurance providers and potential (or even current) policyholders is often strained, at best. Organizations may perceive...
A sophisticated and versatile malware called NKAbuse has been discovered operating as both a flooder and a backdoor, targeting Linux desktops in Colombia, Mexico,...
North Korean hackers are still exploiting Log4Shell around the world. And lately, they're using that access to attack organizations with one of three new...
Remote work has surged in popularity, transforming how you approach your daily tasks and where you perform them. This shift means you’re no longer...
A fresh proof-of-concept (PoC) exploit for a critical security vulnerability in Apache ActiveMQ is making it easier than ever to achieve remote code execution...
The cybersecurity industry constantly says we need new tools to make our organizations secure. BYOD? You need mobile device management (MDM) and endpoint detection...
PRESS RELEASE Santa Clara, Calif. and IT Nation Conference, Orlando, Florida – November 7, 2023 – Malwarebytes, a global leader in real-time cyber protection,...
Highly experienced information security team in place? Check.Leading endpoint detection software and monitoring in place? Check.Multifactor authentication enabled on all environment entry points? Check.By...
Chinese advanced persistent threats (APTs) are known for being sophisticated, but the "ToddyCat" group is bucking the trend, compromising telecommunications organizations in Central and Southeast...
In the fast-paced landscape of cloud security, attacks have become a formidable adversary. As organizations migrate their data and applications to the cloud, malicious...
In early 2023, a user named "spyboy" promoted a tool for evading endpoint defense on the Windows operating system through the Russian-language forum Ramp....