Has Facebook leaked your phone number?

A giant collection of personal information from an old Facebook data leak has emerged. Find out why it matters and what you can do about it.

Read more

Report reveals the staggering scale of Business Email Compromise losses

A new report from the Internet Crime Complaint Center (IC3), shows that businesses lost $1.8 billion to BEC scams in 2020.

Read more

A week in security (March 1 – 7)

A roundup of cybersecurity news from March 1 – 7, including Ryuk going worm, Exchange servers under attack, stolen VPN data, and more.

Read more

A week in security (January 18 – January 24)

An action-packed week on Malwarebytes Labs with ZeroLogon, DNSPooq, WhatsApp privacy, Tiktok settings, Zoom watermarking, and more.

Read more

Cybercriminals want your cloud services accounts, CISA warns

CISA has issued a warning about several recent successful cyberattacks against various organizations’ cloud services

Read more

A week in security (August 3 – 9)

A roundup of cybersecurity news from August 3 – 9, including a look at business email compromises, a new data privacy bill, and the Inter skimming attack.

Read more

Business email compromise: gunning for goal

We look at the latest happenings in the world of business email compromise (BEC).

Read more

Lock and Code S1Ep7: Sounding the trumpet on web browser privacy with Pieter Arntz

This week on Lock and Code, we talk to Pieter Arntz about web browser privacy—an often neglected subcategory of data privacy.

Read more

Lock and Code S1Ep2: On the challenges of managed service providers

On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play’s poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints.

Read more

Not us, YOU: vendor email compromise explained

Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both.

Read more

Select your language