All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

March 21, 2019 - A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.

CONTINUE READINGNo Comments

March 1, 2019 - A recently released paper by Google has resurrected the spirit of Spectre, a seemingly never-ending threat to most makes of processor. We take a look at what this means, and what the Universal Read Gadget means for most technology users.

CONTINUE READINGNo Comments

February 14, 2019 - A hacker managed to compromise, and entirely destroy, a popular email service and all of its backups. What happened?

CONTINUE READINGNo Comments

January 16, 2019 - While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we're going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

CONTINUE READINGNo Comments

January 11, 2019 - Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

CONTINUE READINGNo Comments

December 26, 2018 - In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.

CONTINUE READINGNo Comments

October 23, 2018 - What are our options for secure and honest election results? Should we be using voting machines or are there better alternatives?

CONTINUE READINGNo Comments

October 10, 2018 - A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.

CONTINUE READINGNo Comments

October 4, 2018 - Security researchers have detected the first known instance of a UEFI bootkit being used against government bodies in Central and Eastern Europe. The attack relies on a persistence mechanism stolen from a legitimate software called Computrace—essentially LoJack for computers—that comes by default on many machines.

CONTINUE READINGNo Comments

September 28, 2018 - Magecart and other criminal groups are causing mayhem by stealing payment information from e-commerce sites, big and small. Learn how they are doing it and how to mitigate against it.

CONTINUE READINGNo Comments

TOP POSTS

    Cybersecurity info you can't do without

    Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

    Select your language