Skip to content
Tuesday, October 21, 2025
Latest:
  • Hackers Dox ICE, DHS, DOJ, and FBI Officials
  • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
  • One Republican Now Controls a Huge Chunk of US Election Infrastructure
  • When Face Recognition Doesn’t Know Your Face Is a Face
  • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    Computer Security Articles

    RSS Reader for Computer Security Articles

    • Home
      • Fortinet
      • MalwareBytes
      • Sophos
      • TrendMicro
      • Kaspersky
      • QuickHeal
    • Independent
      • Krebs
      • Securiteam
      • ComputerWorld
    • ScadaICS
      • Schneider
    • Security Videos
    • ThreatMap Fortinet
    MalwareBytesSecurity

    A week in security (January 27 – February 2)

    February 3, 2025 admin

    Last week on Malwarebytes Labs:

    • ClickFix vs. traditional download in new DarkGate campaign
    • Cybercrime gets a few punches on the nose
    • Microsoft advertisers phished via malicious Google ads
    • The DeepSeek controversy: Authorities ask where does the data come from and how safe is it?
    • These are the 10 worst PIN codes
    • Apple users: Update your devices now to patch zero-day vulnerability
    • UnitedHealth almost doubles victim numbers from massive Change Healthcare data breach

    Last week on ThreatDown:

    • How a clipboard hijacker delivers Lumma Stealer

    Stay safe!


    Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.

    TRY NOW

    https://blog.malwarebytes.com/feed/

    • Native Sensors vs. Integrations for XDR Platforms?
    • WhatsApp says Paragon is spying on specific users

    Connect with:

    Recent Posts

    • Hackers Dox ICE, DHS, DOJ, and FBI Officials
    • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
    • One Republican Now Controls a Huge Chunk of US Election Infrastructure
    • When Face Recognition Doesn’t Know Your Face Is a Face
    • A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    Categories

    • ComputerWorld (1,732)
    • Fortinet (660)
    • Independent (3,639)
    • Kaspersky (1,498)
    • Krebs (831)
    • Magazine (81)
    • MalwareBytes (3,204)
    • Microsoft (907)
    • MotherBoard (849)
    • QuickHeal (455)
    • ScadaICS (2,845)
    • Schneider (2,845)
    • Securiteam (217)
    • Security (14,134)
    • Sophos (1,618)
    • TrendMicro (1,367)
    • VirusBulletin (81)
    • Wired (3,485)
      Copyright © 2025 Computer Security Articles. All rights reserved.
      Theme: ColorMag by ThemeGrill. Powered by WordPress.