Confluence exploits used to drop ransomware on vulnerable servers
Credit to Author: Andrew Brandt| Date: Thu, 16 Jun 2022 11:00:03 +0000
Automated attacks are now widely exploiting the Atlassian vulnerability
Read moreCredit to Author: Andrew Brandt| Date: Thu, 16 Jun 2022 11:00:03 +0000
Automated attacks are now widely exploiting the Atlassian vulnerability
Read moreCredit to Author: Wendy Zamora| Date: Thu, 08 Aug 2019 14:00:00 +0000
This quarter, we noticed one threat dominating the landscape so much it deserved its own hard look. Ransomware is back in a big way, targeting businesses with brute force. Categories: Tags: cerberCTNTgandcrabLockyPhobosransomwareransomware reportrapidryukRyuk ransomwareSodinokibiTroldeshTroldesh ransomware |
The post Labs quarterly report finds ransomware’s gone rampant against businesses appeared first on Malwarebytes Labs.
Read moreCredit to Author: Bill Brenner| Date: Thu, 02 Nov 2017 10:00:31 +0000
SophosLabs looked at the most prolific ransomware variants. And, we offer you the tools to better defend against them.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=43824&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KUjPWMy0Kt8″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Bill Brenner| Date: Thu, 02 Nov 2017 10:00:31 +0000
SophosLabs looked at the most prolific ransomware variants. And, we offer you the tools to better defend against them.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=43824&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KUjPWMy0Kt8″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Malwarebytes Labs| Date: Thu, 12 Oct 2017 16:00:27 +0000
In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed shifts in malware distribution, the revival of some old families, and found cases of international tech support scams. Categories: Tags: 3rd quarterandroid malwareastrumbreachcerbercybercrimecybercrime tactics and techniquesemotetEquifaxexploit kitfrancophonefruitflyglobeimposterLockymac malwaremalicious spammalspamMalwarebytesmalwarebytes labsnational health serviceNHSoceanlotusq3 2017reportRIGsmartscreensonictech support scamstrickbottrojan.clicker.hyjwhole foods |
The post Labs report: summer ushers in unprecedented season of breaches appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 14 Aug 2017 19:51:26 +0000
A compilation of security news and blog posts from Monday the 7th of August to August 14th. We looked at security certificates and the new bloated Cerber ransomware. Categories: Tags: cerbercertificatesdnaLockyMagnitudemambaransomwaresecurityweekly blog roundup |
The post Week in Security (August 7 – August 13) appeared first on Malwarebytes Labs.
Read moreCredit to Author: Jérôme Segura| Date: Wed, 09 Aug 2017 15:54:54 +0000
We review a trick that the Magnitude exploit kit uses to bypass security scanners. Categories: Tags: binary paddingcerberexploit kitgateMagnigatemagnitude EKransomwareXML |
The post Cerber ransomware delivered in format of a different order of Magnitude appeared first on Malwarebytes Labs.
Read moreCredit to Author: Jérôme Segura| Date: Wed, 02 Aug 2017 15:00:06 +0000
This post shines some light on a ‘gate’ belonging to the geo-targeted Magnitude exploit kit. Categories: Tags: cerberEKexploit kitkoreaMagnigateMagnitudemalvertisingransomware |
The post Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain appeared first on Malwarebytes Labs.
Read more