Collection 1 data breach: what you need to know

Credit to Author: Malwarebytes Labs| Date: Fri, 18 Jan 2019 18:33:40 +0000

In what’s being dubbed one of the largest data dumps in history, Collection 1 contains the data of over 770 million people. But is it really as bad as it sounds? We take a closer look and let users know what to do if their info is caught up in the mix.

Categories:

Tags:

(Read more…)

The post Collection 1 data breach: what you need to know appeared first on Malwarebytes Labs.

Read more

Luas data ransom: the hacker who cried wolf?

Credit to Author: Christopher Boyd| Date: Fri, 11 Jan 2019 18:00:00 +0000

Irish tram firm Luas were recently compromised and told to pay 1 Bitcoin, or risk user data being fired into the void. The deadline for paying the ransom has now passed: So what happens next? And is anyone out there really at risk?

Categories:

Tags:

(Read more…)

The post Luas data ransom: the hacker who cried wolf? appeared first on Malwarebytes Labs.

Read more

Beware! Your website might be delivering Emotet malware

Credit to Author: Bajrang Mane| Date: Sat, 29 Dec 2018 08:28:45 +0000

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…

Read more

The complete story of EMOTET: Most prominent Malware of 2018

Credit to Author: Bajrang Mane| Date: Sat, 29 Dec 2018 08:28:45 +0000

In 2018, we saw a surge in Emotet activity. Emotet started as a banking trojan but this blog will shed light on how it has also become a “threat distributor”. We will also discuss server-side and client-side activity and how it spreads. Its self-propagation makes it all the more challenging…

Read more

2018: The year of the data breach tsunami

Credit to Author: Logan Strain| Date: Fri, 28 Dec 2018 16:00:00 +0000

To get a sense of the grim state of data security today, take a look at this infographic from TruthFinder that explains why 2018 was the year of the data breach tsunami.

Categories:

Tags:

(Read more…)

The post 2018: The year of the data breach tsunami appeared first on Malwarebytes Labs.

Read more

Breaches, breaches everywhere, it must be the season

Credit to Author: Malwarebytes Labs| Date: Wed, 05 Dec 2018 19:57:59 +0000

Where are all these major breaches coming from? What should we do if we are a victim? And how can we as a company prevent them?

Categories:

Tags:

(Read more…)

The post Breaches, breaches everywhere, it must be the season appeared first on Malwarebytes Labs.

Read more

Marriott breach impacts 500 million customers: here’s what to do about it

Credit to Author: Malwarebytes Labs| Date: Fri, 30 Nov 2018 19:17:33 +0000

Marriott disclosed a large-scale data breach impacting up to 500 million customers who have stayed at a Starwood-branded hotel within the last four years.

Categories:

Tags:

(Read more…)

The post Marriott breach impacts 500 million customers: here’s what to do about it appeared first on Malwarebytes Labs.

Read more

Today’s Data Breach Environment: An Overview

Credit to Author: Trend Micro| Date: Wed, 28 Nov 2018 19:04:36 +0000

By now, companies and consumers alike are well aware of the threat of a data breach. Large and small businesses across every sector have been targeted, and many customers are now familiar with the notification that their username, password or other details might have been compromised. The unfortunate fact is that, despite efforts on the…

The post Today’s Data Breach Environment: An Overview appeared first on .

Read more

Which Threats had the Most Impact During the First Half of 2018?

Credit to Author: Trend Micro| Date: Mon, 05 Nov 2018 15:00:50 +0000

One of the best ways for organizations to shore up their data security efforts and work toward more proactive protection is by examining trends within the threat environment. Taking a look at the strategies for attack, infiltration and infection currently being utilized by hackers can point toward the types of security issues that will continue…

The post Which Threats had the Most Impact During the First Half of 2018? appeared first on .

Read more