Skip to content
Thursday, July 31, 2025
Latest:
  • Attending Black Hat? Connect with Fortinet.
  • Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet
  • Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
  • The Age-Checked Internet Has Arrived
  • A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

    Computer Security Articles

    RSS Reader for Computer Security Articles

    • Home
      • Fortinet
      • MalwareBytes
      • Sophos
      • TrendMicro
      • Kaspersky
      • QuickHeal
    • Independent
      • Krebs
      • Securiteam
      • ComputerWorld
    • ScadaICS
      • Schneider
    • Security Videos
    • ThreatMap Fortinet
    MalwareBytesSecurity

    A week in security (March 7 – March 13)

    March 14, 2022 admin

    Credit to Author: Malwarebytes Labs| Date: Mon, 14 Mar 2022 10:52:34 +0000

    Last week on Malwarebytes Labs:

    • The struggle to reduce bug-fixing time is real
    • Update now! Mozilla patches two actively exploited vulnerabilities
    • Google takes on Docs notification spammers
    • When fake dating profiles try the military approach
    • Azure AutoWarp brings automation headaches
    • RagnarLocker ransomware gang breached 52 critical infrastructure organizations
    • FormBook spam campaign targets citizens of Ukraine
    • Update now! Microsoft patches three zero-day vulnerabilities on Patch Tuesday
    • Twitter makes the leap to Tor
    • Brave browser goes the extra mile to block third-party cookies
    • Extortion scheme impersonates government officials, law enforcement
    • Ransomware: February 2022 review
    • Linux “Dirty Pipe” vulnerability gives unprivileged users root access
    • HBO sued for sharing subscriber data with Facebook
    • Blunting RDP brute-force attacks with rate limiting

    Stay safe!

    The post A week in security (March 7 – March 13) appeared first on Malwarebytes Labs.

    https://blog.malwarebytes.com/feed/

    • Stay Alert of Facebook Credential Stealer Applications Stealing User’s Credentials.
    • CISA list of 95 new known exploited vulnerabilities raises questions

    Connect with:

    Recent Posts

    • Attending Black Hat? Connect with Fortinet.
    • Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet
    • Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
    • The Age-Checked Internet Has Arrived
    • A Premium Luggage Service’s Web Bugs Exposed the Travel Plans of Every User—Including Diplomats

    Categories

    • ComputerWorld (1,732)
    • Fortinet (659)
    • Independent (3,639)
    • Kaspersky (1,498)
    • Krebs (831)
    • Magazine (81)
    • MalwareBytes (3,204)
    • Microsoft (883)
    • MotherBoard (849)
    • QuickHeal (455)
    • ScadaICS (2,845)
    • Schneider (2,845)
    • Securiteam (217)
    • Security (14,048)
    • Sophos (1,618)
    • TrendMicro (1,367)
    • VirusBulletin (81)
    • Wired (3,424)
      Copyright © 2025 Computer Security Articles. All rights reserved.
      Theme: ColorMag by ThemeGrill. Powered by WordPress.