All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

November 21, 2018 - Deepfake is a machine learning technique that is capable of perfect imitations of facial expressions in videos. Will adding voice imitations to them lead to the perfect scam?

CONTINUE READINGNo Comments

November 20, 2018 - In this web skimming match between two Magecart groups, there can only be one winner.

CONTINUE READINGNo Comments

November 12, 2018 - TrickBot has been present in the threat landscape from quite a while. We wrote about its first version in October 2016. October 2018 marks end of the second year since TrickBot’s appearance. Possibly the authors decided to celebrate the anniversary by a makeover of some significant elements of the core. This post is an analysis of the updated obfuscation used by TrickBot’s main module.

CONTINUE READINGNo Comments

November 5, 2018 - A new browlock (browser locker) steps up the game once more with soup to nuts obfuscation. Learn more about how it works and what you can do to protect against it.

CONTINUE READINGNo Comments

October 29, 2018 - A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.

CONTINUE READINGNo Comments

October 26, 2018 - A file downloaded to your computer says it's a virus but turns out to just be a ploy used by tech support scammers.

CONTINUE READINGNo Comments

October 24, 2018 - With a fresh exploit kit in town, the drive-by download landscape shows new signs of life in fall 2018.

CONTINUE READINGNo Comments

October 24, 2018 - New Mac malware has been found that intercepts encrypted traffic for the purpose of injecting ads into web pages. But could this adware be used for more devious purposes in the future?

CONTINUE READINGNo Comments

October 12, 2018 - Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

CONTINUE READINGNo Comments

October 5, 2018 - In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language