How CVSS works: characterizing and scoring vulnerabilities

CVSS, or Common Vulnerability Scoring System, provides developers, testers, and security professionals with a standardized process to assess vulnerabilities.

Categories:

Tags:

(Read more…)

The post How CVSS works: characterizing and scoring vulnerabilities appeared first on Malwarebytes Labs.

Biotech health care innovations meet security challenges

Advancements in biotech could save thousands, if not millions of lives. But what security and privacy challenges do they introduce? We take a close look at recent innovations.

Categories:

Tags:

(Read more…)

The post Biotech health care innovations meet security challenges appeared first on Malwarebytes Labs.

A week in security (October 14 – 20)

Cybersecurity news for October 14 – 20, including the future of the password, the lingering threat of ransomware, and new security features from Instagram.

Categories:

Tags:

(Read more…)

The post A week in security (October 14 – 20) appeared first on Malwarebytes Labs.

Pulse VPN patched their vulnerability, but businesses are trailing behind

After a vulnerability in a popular business VPN solutions was discussed at length and an easy to use exploit is availbale, organizations still fail to apply the patch. What’s up?

Categories:

Tags:

(Read more…)

The post Pulse VPN patched their vulnerability, but businesses are trailing behind appeared first on Malwarebytes Labs.

15,000 webcams vulnerable to attack: how to protect against webcam hacking

We take a look at the ever-present threat of webcam hacking, and what you can do to avoid being caught out.

Categories:

Tags:

(Read more…)

The post 15,000 webcams vulnerable to attack: how to protect against webcam hacking appeared first on Malwarebytes Labs.

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Labs report: Malicious AI is coming—is the security world ready?

Malwarebytes Labs’ latest report looks at the near-future reality of malicious artificial intelligence (AI), evaluating how the technology is being used today, and how it realistically might be abused in the next few years.

Categories:

Tags:

(Read more…)

The post Labs report: Malicious AI is coming—is the security world ready? appeared first on Malwarebytes Labs.

A week in security (May 13 – 19)

A roundup of security news from May 13–19, including ransomware attacks on the upswing, website hacking, pseudo-VPNs, bloatware, and more.

Categories:

Tags:

(Read more…)

The post A week in security (May 13 – 19) appeared first on Malwarebytes Labs.

Electrum Bitcoin wallets under siege

Threat actors are relentlessly phishing and attacking Electrum Bitcoin wallet users, racking up millions of dollars.

Categories:

Tags:

(Read more…)

The post Electrum Bitcoin wallets under siege appeared first on Malwarebytes Labs.

Who is managing the security of medical management apps?

Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That’s why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible?

Categories:

Tags:

(Read more…)

The post Who is managing the security of medical management apps? appeared first on Malwarebytes Labs.