Exploit kits: summer 2018 review

Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review.

Read more

Exploit kits: Spring 2018 review

In this Spring 2018 snapshot, we review the top exploit kits observed in the wild.

Read more

Exploit kits: Winter 2018 review

In this Winter 2018 review, we check the pulse of exploit kits and their latest developments.

Read more

RIG malvertising campaign uses cryptocurrency theme as decoy

This malvertising campaign uses a popular cryptocurrency theme to redirect users to the RIG exploit kit.

Read more

GandCrab ransomware distributed by RIG and GrandSoft exploit kits (updated)

Ransomware may have slowed its growth but is still a go-to payload for threat actors looking to monetize drive-by download attacks. The latest attempt: GandCrab ransomware.

Read more

Seamless campaign serves RIG EK via Punycode (updated)

The most prolific gate to the RIG exploit kit is coming in a different flavor. The Seamless campaign is now using a domain name with foreign characters translated by Punycode.

Read more

Labs report: summer ushers in unprecedented season of breaches

In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed shifts in malware distribution, the revival of some old families, and found cases of international tech support scams.

Read more

A week in security (August 28 – September 3)

A compilation of security news and blog posts from the 28th of August to the 3rd of September. We touched on Kronos, Locky, a 419 scam, insider threats, and more!

Read more

RIG exploit kit distributes Princess ransomware

A new campaign via the RIG exploit kit is pushing the Princess ransomware.

Read more

Report: Second quarter dominated by ransomware outbreaks

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Read more

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language