Malsmoke operators abandon exploit kits in favor of social engineering scheme

Threat actors behind malsmoke, one of the largest malvertising campaigns we’ve seen in recent months, have switched malware delivery tactics.

Read more

Taurus Project stealer now spreading via malvertising campaign

The Taurus Project stealer gains an additional distribution vector via exploit kit.

Read more

Lock and Code S1Ep15: Safely using Google Chrome Extensions with Pieter Arntz

This week on Lock and Code, we talk to Pieter Arntz, malware intelligence researcher for Malwarebytes, about Google Chrome extensions.

Read more

Malvertising campaigns come back in full swing

Threat actors monetize on adult traffic in several large malvertising campaigns.

Read more

Copycat criminals abuse Malwarebytes brand in malvertising campaign

This fake, copycat Malwarebytes site was set up by cybercriminals to distribute malware in a malvertising campaign. We examine the campaign—and the criminals’ motives.

Read more

Domen toolkit gets back to work with new malvertising campaign

We describe the latest malvertising campaign that uses Domen, an advanced social engineering toolkit.

Read more

Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers

Rudy Giuliani’s Twitter account contains many typos that lead to the wrong website—and scammers and typosquatters are taking advantage.

Read more

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.

Read more

Spelevo exploit kit debuts new social engineering trick

In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.

Read more

300 shades of gray: a look into free mobile VPN apps

Mobile VPN apps are one of the best tools for protecting user privacy. Unfortunately, a notable number of them are deemed unsafe. Read on to find out how to assess the best mobile VPN for you.

Read more

Select your language