A week in security (March 4 – 11)

A roundup of cybersecurity news from March 4–11, including a Chrome zero-day, Labs’ data privacy report, news from RSA, and more.

Read more

Spotlight on Troldesh ransomware, aka ‘Shade’

Troldesh is ransomware that relies heavily on user interaction. Nevertheless, a recent spike in detections shows it’s been successful against businesses in the first few months of 2019.

Read more

What K–12 schools need to shore up cybersecurity

We discuss the challenges facing K–12 schools looking to protect students’ data, and which solutions they can adopt in order to build up defenses and increase cybersecurity awareness.

Read more

2019 State of Malware report: Trojans and cryptominers dominate threat landscape

The 2019 State of Malware report is here. Learn what Malwarebytes Labs researchers discovered about the top global threats for businesses and consumers in 2018, and predictions for 2019.

Read more

A week in security (January 7 – 13)

A roundup of last week’s security news from January 7 to 13, including breaches, takedowns, bug fixes, and social media issues.

Read more

Luas data ransom: the hacker who cried wolf?

Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Read more

Ryuk ransomware attacks businesses over the holidays

Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions unanswered. What do we know so far?

Read more

Vidar and GandCrab: stealer and ransomware combo observed in the wild

Threat actors combine new stealer Vidar and GandCrab ransomware in one-two punch.

Read more

All the reasons why cybercriminals want to hack your phone

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Read more

Compromising vital infrastructure: air traffic control

The aviation industry and air traffic (control) are vital elements of our infrastructure. While flying is reportedly safe, how does that landscape look cybersecurity-wise?

Read more

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language