Sophisticated threats plague ailing healthcare industry

Credit to Author: Jovi Umawing| Date: Tue, 30 Apr 2019 15:00:00 +0000

Black hat hackers are after patient healthcare data, and such breaches will only intensify. Which forms of malware are behind the attacks? We take a look at the advanced threats targeting a sector struggling to keep up.

Categories:

Tags:

(Read more…)

The post Sophisticated threats plague ailing healthcare industry appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Medical Malware and Monitor Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 18 Apr 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how baby monitors may be susceptible to hacking. Also, learn about a medical flaw that enables hackers to hide malware. Read on: Is Your Baby Monitor…

The post This Week in Security News: Medical Malware and Monitor Hacks appeared first on .

Read more

Emotet revisited: pervasive threat still a danger to businesses

Credit to Author: Pieter Arntz| Date: Thu, 14 Mar 2019 15:00:00 +0000

Emotet is often mentioned as one of the most annoying, effective, and costly present-day malware infections. We discuss the reasons why and the proper way to remove it.

Categories:

Tags:

(Read more…)

The post Emotet revisited: pervasive threat still a danger to businesses appeared first on Malwarebytes Labs.

Read more

Sophisticated Ransomware : “Katyusha”

Credit to Author: Ghanshyam More| Date: Fri, 14 Dec 2018 10:59:58 +0000

For several months, Quick Heal Security Labs has been observing an increase in ransomware, we have found one more interesting ransomware which encrypts files and adds extension “.katyusha” and demands for an amount of 0.5 btc within three days and threatens to release the data to public download if the ransom is not…

Read more

How threat actors are using SMB vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 14 Dec 2018 16:00:00 +0000

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.

Read more

New ‘Under the Radar’ report examines modern threats and future technologies

Credit to Author: Malwarebytes Labs| Date: Wed, 05 Dec 2018 13:01:44 +0000

Malwarebytes released a new report called “Under the Radar: The Future of Undetected Malware” that takes a look at current threats using next generation tricks, and how current security technologies stand up to these threats, as well as the threats to come.

Categories:

Tags:

(Read more…)

The post New ‘Under the Radar’ report examines modern threats and future technologies appeared first on Malwarebytes Labs.

Read more

Malwarebytes’ 2019 security predictions

Credit to Author: Malwarebytes Labs| Date: Tue, 27 Nov 2018 16:00:00 +0000

Every year, we at Malwarebytes Labs like to stare into our crystal ball and foretell the future of malware. And while all hope is for a threat-free 2019, the reality likely includes botnets, IoT, artificial intelligence, and even more data breaches. When it comes to security, we can pretty much assure you that attacks will keep happening—just as the sun rises and sets. 

Categories:

Tags:

(Read more…)

The post Malwarebytes’ 2019 security predictions appeared first on Malwarebytes Labs.

Read more

Emotet on the rise with heavy spam campaign

Credit to Author: Adam Kujawa| Date: Fri, 21 Sep 2018 22:55:12 +0000

Over the last few days, we’ve noticed a large increase in malicious spam spreading Emotet, as well as a higher number of detections from our customers. Looks like we’re in the middle of an active Emotet campaign.

Categories:

Tags:

(Read more…)

The post Emotet on the rise with heavy spam campaign appeared first on Malwarebytes Labs.

Read more

A worthy upgrade: Next-gen security on Windows 10 proves resilient against ransomware outbreaks in 2017

Credit to Author: Windows Defender ATP| Date: Wed, 10 Jan 2018 14:00:31 +0000

Adopting reliable attack methods and techniques borrowed from more evolved threat types, ransomware attained new levels of reach and damage in 2017. The following trends characterize the ransomware narrative in the past year: Three global outbreaks showed the force of ransomware in making real-world impact, affecting corporate networks and bringing down critical services like hospitals,

Read more

Read more

Report: Second quarter dominated by ransomware outbreaks

Credit to Author: Malwarebytes Labs| Date: Thu, 06 Jul 2017 19:06:53 +0000

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Categories:

Tags:

(Read more…)

The post Report: Second quarter dominated by ransomware outbreaks appeared first on Malwarebytes Labs.

Read more

All this EternalPetya stuff makes me WannaCry

Credit to Author: Adam McNeil| Date: Thu, 06 Jul 2017 18:15:09 +0000

Get more background on the EternalPetya ransomware. Learn about its origin, attribution, decryption, and the methods of infection and propagation.

Categories:

Tags:

(Read more…)

The post All this EternalPetya stuff makes me WannaCry appeared first on Malwarebytes Labs.

Read more