Skip to content
Friday, August 1, 2025
Latest:
  • How Feedback Loops and Machine Learning Power High-Precision Intrusion Detection in Lacework FortiCNAPP
  • The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
  • The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
  • Attending Black Hat? Connect with Fortinet.
  • Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet

    Computer Security Articles

    RSS Reader for Computer Security Articles

    • Home
      • Fortinet
      • MalwareBytes
      • Sophos
      • TrendMicro
      • Kaspersky
      • QuickHeal
    • Independent
      • Krebs
      • Securiteam
      • ComputerWorld
    • ScadaICS
      • Schneider
    • Security Videos
    • ThreatMap Fortinet
    MalwareBytesSecurity

    A week in security (February 19 – February 25)

    February 28, 2024 admin

    Last week on Malwarebytes Labs:

    • Joomla! patches XSS flaws that could lead to remote code execution
    • Update now! ConnectWise ScreenConnect vulnerability needs your attention
    • Why ransomware gangs love using RMM tools—and how to stop them
    • Signal to shield user phone numbers by default
    • Vibrator virus steals your personal information
    • A first analysis of the i-Soon data leak
    • ThreatDown EDR update: Streamlined Suspicious Activity investigation
    • Law enforcement trolls LockBit, reveals massive takedown
    • Wyze cameras show the wrong feeds to customers. Again.
    • Malvertising: This cyberthreat isn’t on the dark web, it’s on Google
    • Raccoon Infostealer operator extradited to the United States
    • LockBit, the world’s worst ransomware, is down
    • Why keeping track of user accounts is important

    Stay safe!


    Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

    TRY NOW

    https://blog.malwarebytes.com/feed/

    • Joomla! patches XSS flaws that could lead to remote code execution
    • How to make a fake ID online, with Joseph Cox: Lock and Code S05E05

    Connect with:

    Recent Posts

    • How Feedback Loops and Machine Learning Power High-Precision Intrusion Detection in Lacework FortiCNAPP
    • The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
    • The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware
    • Attending Black Hat? Connect with Fortinet.
    • Age Verification Laws Send VPN Use Soaring—and Threaten the Open Internet

    Categories

    • ComputerWorld (1,732)
    • Fortinet (660)
    • Independent (3,639)
    • Kaspersky (1,498)
    • Krebs (831)
    • Magazine (81)
    • MalwareBytes (3,204)
    • Microsoft (883)
    • MotherBoard (849)
    • QuickHeal (455)
    • ScadaICS (2,845)
    • Schneider (2,845)
    • Securiteam (217)
    • Security (14,051)
    • Sophos (1,618)
    • TrendMicro (1,367)
    • VirusBulletin (81)
    • Wired (3,426)
      Copyright © 2025 Computer Security Articles. All rights reserved.
      Theme: ColorMag by ThemeGrill. Powered by WordPress.