All 101 Cybercrime Malwarebytes news PUP Security world Threat analysis

November 5, 2018 - A new browlock (browser locker) steps up the game once more with soup to nuts obfuscation. Learn more about how it works and what you can do to protect against it.

CONTINUE READINGNo Comments

October 29, 2018 - A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.

CONTINUE READINGNo Comments

October 26, 2018 - A file downloaded to your computer says it's a virus but turns out to just be a ploy used by tech support scammers.

CONTINUE READINGNo Comments

October 24, 2018 - With a fresh exploit kit in town, the drive-by download landscape shows new signs of life in fall 2018.

CONTINUE READINGNo Comments

October 24, 2018 - New Mac malware has been found that intercepts encrypted traffic for the purpose of injecting ads into web pages. But could this adware be used for more devious purposes in the future?

CONTINUE READINGNo Comments

October 12, 2018 - Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

CONTINUE READINGNo Comments

October 5, 2018 - In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures.

CONTINUE READINGNo Comments

September 26, 2018 - A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.

CONTINUE READINGNo Comments

September 20, 2018 - Thousands of WordPress sites have been injected with the same malicious redirection. We review the infection details and the malicious traffic leading to browser lockers.

CONTINUE READINGNo Comments

September 7, 2018 - There are several apps in the Mac App Store that are collecting data about users that they should not be collecting. Here's what you need to know.

CONTINUE READINGNo Comments

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language