Underminer exploit kit improves in its latest iteration

Credit to Author: Jérôme Segura| Date: Fri, 21 Dec 2018 21:34:24 +0000

We take a look at some recent changes with the elusive Underminer exploit kit.

Categories:

Tags:

(Read more…)

The post Underminer exploit kit improves in its latest iteration appeared first on Malwarebytes Labs.

Read more

How threat actors are using SMB vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 14 Dec 2018 16:00:00 +0000

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.

Read more

New ‘Under the Radar’ report examines modern threats and future technologies

Credit to Author: Malwarebytes Labs| Date: Wed, 05 Dec 2018 13:01:44 +0000

Malwarebytes released a new report called “Under the Radar: The Future of Undetected Malware” that takes a look at current threats using next generation tricks, and how current security technologies stand up to these threats, as well as the threats to come.

Categories:

Tags:

(Read more…)

The post New ‘Under the Radar’ report examines modern threats and future technologies appeared first on Malwarebytes Labs.

Read more

Exploit kits: fall 2018 review

Credit to Author: Jérôme Segura| Date: Wed, 24 Oct 2018 16:10:54 +0000

With a fresh exploit kit in town, the drive-by download landscape shows new signs of life in fall 2018.

Categories:

Tags:

(Read more…)

The post Exploit kits: fall 2018 review appeared first on Malwarebytes Labs.

Read more

Fake browser update seeks to compromise more MikroTik routers

Credit to Author: Malwarebytes Labs| Date: Fri, 12 Oct 2018 15:00:06 +0000

Threat actors are social engineering users with a fake update that, once installed, will scan the Internet in an attempt to exploit vulnerable MikroTik routers.

Categories:

Tags:

(Read more…)

The post Fake browser update seeks to compromise more MikroTik routers appeared first on Malwarebytes Labs.

Read more

Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT

Credit to Author: Jérôme Segura| Date: Wed, 26 Sep 2018 17:13:26 +0000

A threat actor implements a newer vulnerability exploited in Internet Explorer to serve up the Quasar RAT and diversify the portfolio of attacks.

Categories:

Tags:

(Read more…)

The post Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT appeared first on Malwarebytes Labs.

Read more

Simple Authentication and Security Layer (SASL) vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 21 Sep 2018 15:00:00 +0000

The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them?

Categories:

Tags:

(Read more…)

The post Simple Authentication and Security Layer (SASL) vulnerabilities appeared first on Malwarebytes Labs.

Read more

Microsoft’s September patches fix a raft of serious bugs

Credit to Author: Andrew Brandt| Date: Wed, 19 Sep 2018 18:00:07 +0000

Updates for Windows and Mac users resolve more than five dozen software vulnerabilities<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/HBOC9eD3Jfo” height=”1″ width=”1″ alt=””/>

Read more

Exploit kits: summer 2018 review

Credit to Author: Jérôme Segura| Date: Tue, 07 Aug 2018 15:00:00 +0000

Just like the beach, the EK landscape got a little crowded this summer. Find out what we discovered in our exploit kits summer review.

Categories:

Tags:

(Read more…)

The post Exploit kits: summer 2018 review appeared first on Malwarebytes Labs.

Read more

‘Hidden Bee’ miner delivered via improved drive-by download toolkit

Credit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 21:00:22 +0000

Threat actors switch to the Hidden Bee miner as a payload for this unusual and complex drive-by download campaign.

Categories:

Tags:

()

The post ‘Hidden Bee’ miner delivered via improved drive-by download toolkit appeared first on Malwarebytes Labs.

Read more

Cybercrime tactics & techniques Q2 2018

Credit to Author: Malwarebytes Labs| Date: Tue, 17 Jul 2018 12:05:00 +0000

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more about what you may encounter next quarter.

Categories:

Tags:

(Read more…)

The post Cybercrime tactics & techniques Q2 2018 appeared first on Malwarebytes Labs.

Read more