Torify and analyze traffic for your VM

Several solutions to isolate and analyze a VM network traffic for malware analysis purpose exist. Whonix, Tor and Virtual makes this process painless and efficient.

Read more

Yontoo: PUPs with two faces

We take a look at the methods that the installers for Yontoo browser hijackers use to keep as much information about their program as possible away from security researchers.

Read more

WebSearcher PUP applies Proxy Lockdown

WebSearcher is an adware application that uses a proxy and denies the normal user the right to change the proxy settings.

Read more

My Conversations with Cybersecurity Influencers

Today, we’re excited to be launching our thought leadership series entitled “Marcin’s Soundbytes.” A series where you’ll see me interview some of the savviest professionals in cybersecurity.

Read more

Dell System Detect Vulnerability now classified as a PUP

As of last night, Malwarebytes started detecting a very popular and very vulnerable application as a PUP. This application, known as Dell System Detect, is pre-installed with many Dell systems. According to research done by Tom Forbes, older versions of Dell System Detect are vulnerable to a serious remote code execution attack.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language