Uncategorized

Qantas: Breach affects 6 million people, “significant” amount of data likely taken

Australia’s largest airline Qantas has confirmed that cybercriminals have gained access to a third party customer servicing platform that contained 6 million customer service records. Qantas says the breach occurred after a cybercriminal targeted a call centre and managed to gain access to the third party platform, presumably via social engineering. The airline reassured customers […]

Qantas: Breach affects 6 million people, “significant” amount of data likely taken Leggi tutto »

Update your Chrome to fix new actively exploited zero-day vulnerability

Google has released an update for its Chrome browser to patch an actively exploited flaw. This update is crucial since it addresses an actively exploited vulnerability which can be exploited when the user visits a malicious website. It doesn’t require any further user interaction, which means the user doesn’t need to click on anything in

Update your Chrome to fix new actively exploited zero-day vulnerability Leggi tutto »

Bluetooth vulnerability in audio devices can be exploited to spy on users

Researchers have found vulnerabilities in 29 Bluetooth devices like speakers, earbuds, headphones, and wireless microphones from reputable companies including Sony, Bose, and JBL. The vulnerabilities could be exploited to spy on users, and even steal information from the device. The researchers who discovered the Bluetooth vulnerabilities are from ERNW (Enno Rey Netzwerke GmbH), a well-established

Bluetooth vulnerability in audio devices can be exploited to spy on users Leggi tutto »

Facebook wants to look at your entire camera roll for “AI restyling” suggestions, and more

Facebook’s pursuit of your personal data continues apace, and now it has a new target: photos on your phone that you haven’t shared with it yet. Techcrunch reports that the social media giant is now asking its users to peek at the photos on their phones’ camera rolls. In return it will give them new

Facebook wants to look at your entire camera roll for “AI restyling” suggestions, and more Leggi tutto »

Corpse-eating selfies, and other ways to trick scammers (Lock and Code S06E14)

This week on the Lock and Code podcast… There’s a unique counter response to romance scammers. Her name is Becky Holmes. Holmes, an expert and author on romance scams, has spent years responding to nearly every romance scammer who lands a message in her inbox. She told one scammer pretending to be Brad Pitt that

Corpse-eating selfies, and other ways to trick scammers (Lock and Code S06E14) Leggi tutto »

AT&T to pay compensation to data breach victims. Here’s how to check if you were affected

AT&T is set to pay $177 million to customers affected by two significant data breaches. These breaches exposed sensitive personal information of millions of current and former AT&T customers. For those that have missed the story so far: Back in 2021, an entity named Shiny Hunters (a known hacking group) claimed to have breached AT&T. Later reports indicated

AT&T to pay compensation to data breach victims. Here’s how to check if you were affected Leggi tutto »

Android threats rise sharply, with mobile malware jumping by 151% since start of year

The Android threat landscape in the first half of 2025 has entered a new phase. An era marked not just by volume, but by coordination and precision. Attackers are no longer simply throwing malware at users and hoping for results. They’re building ecosystems . Recent Malwarebytes threat research data reveals a sharp rise in mobile threats

Android threats rise sharply, with mobile malware jumping by 151% since start of year Leggi tutto »

A week in security (June 23 – June 29)

Last week on Malwarebytes Labs: Gmail’s multi-factor authentication bypassed by hackers to pull off targeted attacks Thousands of private camera feeds found online. Make sure yours isn’t one of them Sextortion email scammers increase their “Hello pervert” money demands Many data brokers are failing to register with state consumer protection agencies Facial recognition: Where and

A week in security (June 23 – June 29) Leggi tutto »

Fake DocuSign email hides tricky phishing attempt

On my daily rounds, I encountered a phishing attempt that used a not completely unusual, yet clever delivery method. What began as a seemingly routine DocuSign notification turned into a multi-layered deception involving Webflow, a shady redirect, and a legitimate Google login page. Webflow is a visual website builder that allows designers and developers to

Fake DocuSign email hides tricky phishing attempt Leggi tutto »

Jailbroken AIs are helping cybercriminals to hone their craft

Cybercriminals are bypassing the guardrails that are supposed to keep AI models from carrying out criminal activities, according to researchers. We’ve seen the misuse of AI models by cybercriminals growing rapidly over the past several years, shaping a new era of digital threats. Early on, attackers focused on jailbreaking public AI chatbots, which meant they

Jailbroken AIs are helping cybercriminals to hone their craft Leggi tutto »