All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

May 10, 2018 - Internet Explorer is yet again leveraged for a zero-day exploit delivered via Office document—the first zero-day observed for IE in over two years.

CONTINUE READINGNo Comments

May 9, 2018 - We take a look at a new Netflix phish in circulation, using the time-honored trick of claiming the recipient is about to lose access unless they hand over some personal information.

CONTINUE READINGNo Comments

May 8, 2018 - Kuik adware, which forces affected machines to join a domain controller, is using this unusual technique to push Google Chrome extensions and coin miner applications. In this blog, we'll provide technical analysis of the adware and custom removal instructions.

CONTINUE READINGNo Comments

May 8, 2018 - The same group behind the Shoppers Stop tech scam campaign is at it again, injecting malicious ad code into thousands of sites and redirecting to a templated warning page.

CONTINUE READINGNo Comments

May 3, 2018 - The Necurs gang tries out a new trick to load malware and bypass security defenses.

CONTINUE READINGNo Comments

April 30, 2018 - Spartacus ransomware is a fairly new variant seen in 2018. We'll walk you through the malware sample to analyze the code in detail, and help you learn how to get an obfuscated .NET sample into a readable state.

CONTINUE READINGNo Comments

April 24, 2018 - A new variant of the Crossrider adware has been spotted that is infecting Macs in a unique way, using a configuration profile to keep its effects resident in the system.

CONTINUE READINGNo Comments

April 18, 2018 - Recently, we came across a Python-based sample dropped by an exploit kit. Although it arrives under the disguise of a MinerBlocker, it has nothing in common with miners. In fact, it seems to be PBot: a Python-based adware.

CONTINUE READINGNo Comments

April 17, 2018 - After being faithful to its own Magniber ransomware for several months, Magnitude EK joins others to adopt GandCrab.

CONTINUE READINGNo Comments

April 12, 2018 - In our final installment of the Encryption 101 series, we walk you through the source code of the Princess Locker decryption tool.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language