Security

MalwareBytesSecurity

How to protect against stalkerware, a murky but dangerous mobile threat

Credit to Author: Wendy Zamora| Date: Wed, 09 Oct 2019 15:00:00 +0000

Stalkerware has capabilities as dangerous as nation-state malware, but is often marketed as legitimate. So how do you protect against stalkerware when it’s not always clear it’s a threat?

Categories:

Tags:

(Read more…)

The post How to protect against stalkerware, a murky but dangerous mobile threat appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

Tackling the BEC Epidemic in a New Partnership with INTERPOL

Credit to Author: erinj| Date: Wed, 09 Oct 2019 13:45:45 +0000

In just a few short years, Business Email Compromise (BEC) has gone from a peripheral threat to a major cyber risk for organizations. It’s making criminal gangs millions of dollars each month, hitting corporate profits and reputation in the process. Trend Micro has built a formidable array of resources over the past few years to…

The post Tackling the BEC Epidemic in a New Partnership with INTERPOL appeared first on .

Read More
MalwareBytesSecurity

Explained: war shipping

Credit to Author: Pieter Arntz| Date: Tue, 08 Oct 2019 19:15:46 +0000

War shipping is a tactic already in use by Red teams, and is a growing opportunity for cybercriminals to compromise business networks. Learn how war shipping works and how to protect your organization from it.

Categories:

Tags:

(Read more…)

The post Explained: war shipping appeared first on Malwarebytes Labs.

Read More