May 22, 2018 - About three weeks ago, we published our second CrackMe, which has triggered a lot of interest, and many high-quality write-up submissions. In this post, we summarize the contest and comment on the submissions. Whose write-up won? Read on to find out.
May 21, 2018 - Malwarebytes Labs has been nominated for the Best Corporate Security Blog in the 2018 European Security Blogger Awards. Cast your vote for your favorite blog, and spread the word!
May 7, 2018 - Way back in early 2013, a new antivirus (AV) company emerged into the mobile security software industry that had everyone perplexed. It seemed like a fake Android AV, but received certification by a reputable AV testing organization! Now, five years later, it's back. Here's why you shouldn't trust it.
April 30, 2018 - A roundup of security news from April 23 – April 29, including worms, GDPR, DDoS markets, and more.
April 9, 2018 - What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind.
March 21, 2018 - CyberByte has stolen Malwarebytes' intellectual property, and has been using our data without permission in their CyberByte Antivirus software.
February 6, 2018 - Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance.
January 27, 2018 - Earlier this morning, we published a protection update that caused connection issues for many of our customers. As a side effect of the web protection blocks, the product also spiked memory usage and possibly caused a crash. We have triaged this issue and pushed a protection update that resolves it.
January 26, 2018 - Gartner has recognized Malwarebytes as a “visionary” in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms. Malwarebytes was selected for its completeness of vision and ability to execute.
January 25, 2018 - In our 2017 State of Malware report, we examined attack methods, malware developments, and distribution techniques used by cybercriminals over the last 12 months.