Plugin vulnerabilities exploited in traffic monetization schemes

The latest round of vulnerable WordPress plugins leads to an active traffic monetization campaign via hacked websites.

Read more

Good bots, bad bots: friend or foe?

Bots are an endless source of debate online, but all we ever hear about are the bad ones. In this post, we look at some examples you’ve probably already run into, and explain why one person’s good bot is another organization’s bad one.

Read more

Malwarebytes helps take down massive ad fraud botnets

Malwarebytes joins the fight against ad fraud in one of the largest take down operations in recent history.

Read more, an ad server for adult sites, tops Malwarebytes detections

Learn why Malwarebytes is blocking, an ad server for adult sites. Hint: it’s not because it’s porn.

Read more

Fireball arrests made

Following some arrests in China, we hope to see a decrease in the amount of adware and adfraud hailing from the Rafotech labs aka Fireball.

Read more

Report: Second quarter dominated by ransomware outbreaks

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Read more

Adware the series, part 1

In this series, we will be using the below flowchart to follow the process of determining which adware we are dealing with. The idea is to give you an idea of how many different types of adware are around for Windows systems.

Read more

Adware vs. ad fraud

We explain what adware and ad fraud are and point out the differences by discussing the methods and the classification of the malware that is involved.

Read more

Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report

In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst’s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.

Read more

A week in security (Jan 08 – Jan 14)

A compilation of notable security news and blog posts from the 8th of January to the 14th. This week, we look back at sponsored tweets that phish, fake Word documents that download and execute a bot, ad fraud, and, yes, selfies.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language