cybercrime

MalwareBytesSecurity

Movie stream ebooks gun for John Wick 3 on Kindle store

Credit to Author: Christopher Boyd| Date: Mon, 04 Feb 2019 17:30:37 +0000

Over the weekend, we observed a clever spam campaign using bogus ebooks dressed as John Wick 3 movie files to push links to streaming sites. Can John and your ability avoid web based scams survive?

Categories:

Tags:

(Read more…)

The post Movie stream ebooks gun for John Wick 3 on Kindle store appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge

Credit to Author: Malwarebytes Labs| Date: Mon, 21 Jan 2019 16:15:30 +0000

While many tech-savvy folks are familiar with two-factor authentication (2FA), more are unaware that there are several ways around it. A tactic called Modlishka, the English pronunciation for the Polish word for “mantis,” is the latest in this list.

Categories:

Tags:

(Read more…)

The post Has two-factor authentication been defeated? A spotlight on 2FA’s latest challenge appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Hosting malicious sites on legitimate servers: How do threat actors get away with it?

Credit to Author: Pieter Arntz| Date: Fri, 18 Jan 2019 16:00:00 +0000

Is money all hosting providers care about when it comes to allowing malicious sites on their servers? Or is there more at play? We embark on an investigation to discover their motives.

Categories:

Tags:

(Read more…)

The post Hosting malicious sites on legitimate servers: How do threat actors get away with it? appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

This Week in Security News: Risky Radio Remotes and Cybercrime

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Jan 2019 15:18:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro’s new research on radio frequency technology and the risks of radio remote controllers. Also, understand why there is a rise in physical crime…

The post This Week in Security News: Risky Radio Remotes and Cybercrime appeared first on .

Read More
MalwareBytesSecurity

The Advanced Persistent Threat files: APT10

Credit to Author: William Tsing| Date: Wed, 16 Jan 2019 17:00:00 +0000

While security companies are getting good at analyzing the tactics of nation-state threat actors, they still struggle with placing these actions in context and making solid risk assessments. So in this series, we’re going to take a look at a few APT groups, and see how they fit into the larger threat landscape—starting with APT10.

Categories:

Tags:

(Read more…)

The post The Advanced Persistent Threat files: APT10 appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Luas data ransom: the hacker who cried wolf?

Credit to Author: Christopher Boyd| Date: Fri, 11 Jan 2019 18:00:00 +0000

Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Categories:

Tags:

(Read more…)

The post Luas data ransom: the hacker who cried wolf? appeared first on Malwarebytes Labs.

Read More