
Fake malware-signing service Fox Tempest dismantled by Microsoft
The service let malware authors sign malicious files with fraudulent Microsoft-issued certificates to bypass security checks.
21articoli totali nell'archivio

The service let malware authors sign malicious files with fraudulent Microsoft-issued certificates to bypass security checks.

Firefox 151 adds major privacy improvements and fixes high-priority security vulnerabilities, making this an update you shouldn’t…

NYC Health + Hospitals says attackers accessed its systems for months through a third-party vendor compromise, affecting at least…

A fake Aldi “meat box” offer spreading on Facebook tricks victims into handing over personal and payment info.

"Likeness detection" promises protection from AI deepfakes, but some creators are uneasy about handing over biometric data in…

Saved passwords in Microsoft Edge will no longer sit in plaintext memory for the entire browser session after a researcher raised…

A list of topics we covered in the week of May 11 to May 17 of 2026

The JDownloader website was compromised and installer download links served malware for several days.

WhatsApp now offers disappearing AI chats Meta says it cannot read. While Instagram just removed the feature that stopped Meta…

Some Yahoo Mail users may see repeated Malwarebytes alerts caused by background connections to suspicious third-party domains.…

Experts are urging schools to take down identifiable photos of students, after AI deepfakes have led to sextortion cases at UK…

The Texas AG sued Netflix, accusing the company of secretly tracking viewers, selling user data, and using addictive features…

May’s Patch Tuesday may not be the giant release many expected, but there are still plenty of important fixes that shouldn’t be…


Cifas just published research that should bother anyone who runs a business, or buys from one.

Instructure says the stolen Canvas data impacting millions of students and staff was “returned.” That’s not how breaches work.

A researcher found a host of vulnerabilities in Yarbo garden robots that could expose Wi-Fi passwords, hijack cameras, and run…

A list of topics we covered in the week of May 4 to May 10 of 2026

A researcher found Edge loads saved passwords into computer memory when it starts, making them easier to steal if a device is…

Days after the first attack, ShinyHunters is applying pressure with ransom messages on school login portals.

AI investment scammers abused the Keitaro ad-tracking platform to cloak their campaign except for possible targets