All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

August 7, 2018 - Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review.

CONTINUE READINGNo Comments

July 26, 2018 - Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign.

CONTINUE READINGNo Comments

July 24, 2018 - A new variant of the Mac malware Proton, which was rampant on macOS last year, has been found dating back to at least two years ago. Learn how this could still affect your Mac today.

CONTINUE READINGNo Comments

July 16, 2018 - After a controlled delivery focused on South Korea, an upgraded Magniber ransomware is now affecting other Asian countries.

CONTINUE READINGNo Comments

July 3, 2018 - A web miner injected into compromised sites is just the tip of the iceberg for an infrastructure hosting malicious Windows and Linux coin miners.

CONTINUE READINGNo Comments

July 2, 2018 - The latest macro-less technique to distribute malware via Office documents does not involve exploits. Just a little bit of social engineering.

CONTINUE READINGNo Comments

June 19, 2018 - SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.

CONTINUE READINGNo Comments

June 7, 2018 - In part two of our series on decoding Emotet, we analyze the PowerShell code flow and structure. We also reconstruct the command-line arguments—for fun!

CONTINUE READINGNo Comments

May 31, 2018 - We take a look at Instagram story spam leading to a "free Apple Watch" giveaway on a recently compromised celebrity account.

CONTINUE READINGNo Comments

May 25, 2018 - In the first part of this two-part analysis of Emotet, we look at the VBA code, where you'll learn how to recognize and discard "dead" code thrown in to complicate the analysis process.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language