Latest Cybersecurity News
View all →PoC Exploit Released for Android Zero-Click Flaw Enabling Remote Shell Access
Public references indicate that a GitHub proof-of-concept is now circulating for CVE-2026-0073, the critical Android flaw documented in Google’s May 2026 security bulletin, raising the…
Rustinel: Open-source endpoint detection for Windows and Linux
Open-source endpoint detection has long been split between Windows-focused tools built around Sysmon and Linux tools built around eBPF or auditd. Defenders running mixed environments…
A week in security (May 4 – May 10)
Last week on Malwarebytes Labs: Stay safe! Browse like no one’s watching. Malwarebytes Privacy VPN encrypts your connection and never logs what you do, so the next…
Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads
Ravie LakshmananMay 11, 2026Supply Chain Attack / Threat Intelligence A malicious Hugging Face repository managed to take a spot in the platform’s trending list by…
AI cyber attack threatens global financial crisis, warns International Monetary Fund
The International Monetary Fund (IMF) has said that artificial intelligence (AI)-powered cyber attacks could create a worldwide financial crisis. “AI-driven cyber risks could destabilise the…
California Privacy Settlement Hits GM With Record Penalty
California Attorney General Rob Bonta and a coalition of state and local enforcement agencies have announced a $12.75 million settlement with General Motors over allegations…
National Technology Day: AI And Security Take Centre Stage
As India marks National Technology Day, industry leaders say the country’s technology ambitions are now closely tied to cybersecurity, AI infrastructure, and digital resilience. With…
Take control of your connectivity with Telstra’s Adaptive Networks Centre
Empowering customers to design, deploy and scale their own solutions, Telstra’s new Adaptive Networks Centre delivers a step-change experience to enterprise and business customers managing…
New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks
A newly disclosed local privilege escalation vulnerability affecting major Linux distributions may already be exploited in the wild. The exploit, named Dirty Frag and Copy…