Interview with a malware hunter: Jérôme Segura

In our series called “Interview with a malware hunter,” we turn to Jerome Segura, Head of Threat Intelligence at Malwarebytes. In this Q&A session, we’ll take you behind the scenes to get to know one of our malware intelligence crew.

Read more

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Read more

A week in security (September 25 – October 01)

A compilation of security news and blog posts from the 25th of September to the 1st of October. We touched on that new macOS High Sierra keychain vulnerability, the Deloitte breach, BlueBorne, crypto mining, and others.

Read more

Report: Second quarter dominated by ransomware outbreaks

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Read more

Operation Fingerprint: A Look Into Several Angler Exploit Kit Malvertising Campaigns

A white paper collaboration between Malwarebytes and GeoEdge on the latest malvertising techniques.

Read more

Angler Exploit Kit Strikes on via Malvertising Campaign

The same actors behind the recent Yahoo and Azure malvertising attacks went after this time.

Read more

Potentially Unwanted Program borrows tricks from malware authors

Potentially Unwanted Programs (PUPs) are a major annoyance for Internet users these days. Not only are they using tricks to deceive users into installing unwanted software, they are also getting more clever in order to bypass detection from security researchers and automated analysis.

Read more

Mac users: Beware of increased tech support scam pop-ups

Tech support scam pop-ups are on the rise and the latest wave is also affecting Mac users. Scary warnings about imaginary viruses take over your screen and can be difficult to close. Tips and advice in this post and most importantly, a reminder that you need to refrain from calling the toll-free number at all costs.

Read more compromised again

Our honeypot captured an attack coming from in what appears to have been malicious code injected in their server.

Read more

A cunning way to deliver malware

PUPs aka potentially unwanted programs continue to be a real nuisance.

Read more

Select your language