Meet Extenbro, a new DNS-changer Trojan protecting adware

We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.

Read more

A week in security (June 10 – 16)

A roundup of security news from June 10–16, including MegaCortex, the latest news on privacy, the abuse of Twitter’s Lists feature, and more.

Read more

Adware and PUPs families add push notifications as an attack vector

Push notifications are being added to the arsenal of PUPs, adware, and even a Trojan browser extension that spams Facebook groups.

Read more

Labs Cybercrime Tactics and Techniques report finds businesses hit with 235 percent more threats in Q1

The Labs team discovered that businesses are being targeted with 235 percent more threats than the previous year. Download the report and find out which threats are revving up, and which are dying out.

Read more

A week in security (March 25 – 31)

A roundup of news stories from March 25 – 31, including phishing, hacking, Government studies, mobile dangers on official stores and more.

Read more

Awakening the beast: BatMobi adware

BatMobi is an Advertisement Software Developer Kit (Ad SDK) that was once clean and safe to use, but suddenly began serving adware in January. Learn more about this elusive threat, including how to clean it off pre-installed apps on mobile devices.

Read more

Mac malware intercepts encrypted web traffic for ad injection

New Mac malware has been found that intercepts encrypted traffic for the purpose of injecting ads into web pages. But could this adware be used for more devious purposes in the future?

Read more

Mobile Menace Monday: Adware MobiDash gets stealthy

Adware MobiDash, an ad-displaying nuisance, now comes with some additional stealth features. As a result, these features hide the existence of Adware MobiDash—even when it’s in plain sight.

Read more

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Read more

Kuik: a simple yet annoying piece of adware

Kuik adware, which forces affected machines to join a domain controller, is using this unusual technique to push Google Chrome extensions and coin miner applications. In this blog, we’ll provide technical analysis of the adware and custom removal instructions.

Read more

Select your language