Threat actors behind malsmoke, one of the largest malvertising campaigns we’ve seen in recent months, have switched malware delivery tactics.
The Taurus Project stealer gains an additional distribution vector via exploit kit.
This week on Lock and Code, we talk to Pieter Arntz, malware intelligence researcher for Malwarebytes, about Google Chrome extensions.
This fake, copycat Malwarebytes site was set up by cybercriminals to distribute malware in a malvertising campaign. We examine the campaign—and the criminals’ motives.
We describe the latest malvertising campaign that uses Domen, an advanced social engineering toolkit.
Rudy Giuliani’s Twitter account contains many typos that lead to the wrong website—and scammers and typosquatters are taking advantage.
We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.
In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.
Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of them are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.