Hidden Bee: Let’s go down the rabbit hole

The complex and sophisticated custom malware, Hidden Bee, is a Chinese cryptominer that recently released an updated sample. We unpack the sample to look at the functionality of its loader and compare it against earlier versions.

Read more

Electrum Bitcoin wallets under siege

Threat actors are relentlessly phishing and attacking Electrum Bitcoin wallet users, racking up millions of dollars.

Read more

Google Chrome zero-day: Now is the time to update and restart your browser

A particularly dangerous Google Chrome zero-day is already being used in real-world attacks. Despite Google’s auto update feature, users will need to close and restart their browser in order to be protected.

Read more

A week in security (February 25 – March 3)

A roundup of the past week’s news, including mobile threats, viral scares, PDF tracking, and more.

Read more

How threat actors are using SMB vulnerabilities

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Read more

New ‘Under the Radar’ report examines modern threats and future technologies

Malwarebytes released a new report called “Under the Radar: The Future of Undetected Malware” that takes a look at current threats using next generation tricks, and how current security technologies stand up to these threats, as well as the threats to come.

Read more

Exploit kits: fall 2018 review

With a fresh exploit kit in town, the drive-by download landscape shows new signs of life in fall 2018.

Read more

Simple Authentication and Security Layer (SASL) vulnerabilities

The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them?

Read more

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Read more

SamSam ransomware: what you need to know

We take a look at SamSam ransomware, the malware that messed with Atlanta, and tell you how it works and what you can do to combat it.

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language