How to get Ahead of Vulnerabilities and Protect your Enterprise Business

Credit to Author: Trend Micro| Date: Tue, 12 Mar 2019 14:00:37 +0000

Security vulnerabilities are popping up all the time, and can put any business that uses technological assets at risk. In a nutshell, vulnerabilities represent the ideal opportunity for malicious actors to break into systems and wreak all types of havoc. From data theft to information compromise and beyond, vulnerabilities are a particularly pertinent issue for…

The post How to get Ahead of Vulnerabilities and Protect your Enterprise Business appeared first on .

Read more

Google Chrome zero-day: Now is the time to update and restart your browser

Credit to Author: Malwarebytes Labs| Date: Fri, 08 Mar 2019 19:13:15 +0000

A particularly dangerous Google Chrome zero-day is already being used in real-world attacks. Despite Google’s auto update feature, users will need to close and restart their browser in order to be protected.

Categories:

Tags:

(Read more…)

The post Google Chrome zero-day: Now is the time to update and restart your browser appeared first on Malwarebytes Labs.

Read more

A week in security (February 25 – March 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Mar 2019 18:03:33 +0000

A roundup of the past week’s news, including mobile threats, viral scares, PDF tracking, and more.

Categories:

Tags:

(Read more…)

The post A week in security (February 25 – March 3) appeared first on Malwarebytes Labs.

Read more

Exploit kits: winter 2019 review

Credit to Author: Jérôme Segura| Date: Tue, 12 Feb 2019 16:00:00 +0000

We review the top exploit kits in this winter 2019 snapshot.

Categories:

Tags:

(Read more…)

The post Exploit kits: winter 2019 review appeared first on Malwarebytes Labs.

Read more

New critical vulnerability discovered in open-source office suites

Credit to Author: Jérôme Segura| Date: Wed, 06 Feb 2019 17:16:50 +0000

A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild?

Categories:

Tags:

(Read more…)

The post New critical vulnerability discovered in open-source office suites appeared first on Malwarebytes Labs.

Read more

New critical vulnerability in open-source office suites

Credit to Author: Jérôme Segura| Date: Wed, 06 Feb 2019 17:16:50 +0000

A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild?

Categories:

Tags:

(Read more…)

The post New critical vulnerability in open-source office suites appeared first on Malwarebytes Labs.

Read more

The Fileless, Non-Malware Menace

Credit to Author: Trend Micro| Date: Wed, 06 Feb 2019 14:00:16 +0000

There’s an old expression: if it looks like a duck, walks like a duck, and quacks like a duck, then it must be a duck. What happens, though, if the duck in question is malware that doesn’t behave like typical malware? Namely, it doesn’t drop a file on your disk to infect your computer, hijack…

The post The Fileless, Non-Malware Menace appeared first on .

Read more

Improved Fallout EK comes back after short hiatus

Credit to Author: Jérôme Segura| Date: Thu, 17 Jan 2019 19:51:27 +0000

The Fallout exploit kit is back with some noteworthy improvements.

Categories:

Tags:

(Read more…)

The post Improved Fallout EK comes back after short hiatus appeared first on Malwarebytes Labs.

Read more

Underminer exploit kit improves in its latest iteration

Credit to Author: Jérôme Segura| Date: Fri, 21 Dec 2018 21:34:24 +0000

We take a look at some recent changes with the elusive Underminer exploit kit.

Categories:

Tags:

(Read more…)

The post Underminer exploit kit improves in its latest iteration appeared first on Malwarebytes Labs.

Read more

How threat actors are using SMB vulnerabilities

Credit to Author: Pieter Arntz| Date: Fri, 14 Dec 2018 16:00:00 +0000

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.

Read more