Looking at the financial cyberthreats of 2017 through a business lens
Credit to Author: Nikolay Pankov| Date: Wed, 28 Feb 2018 10:00:05 +0000
Our experts analyzed last year’s financial cyberthreats, and here is their report
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Nikolay Pankov| Date: Wed, 28 Feb 2018 10:00:05 +0000
Our experts analyzed last year’s financial cyberthreats, and here is their report
Read MoreCredit to Author: Preksha Saxena| Date: Tue, 27 Feb 2018 09:59:54 +0000
Cryptocurrencies are all the vogue now. This has resulted in the emergence of increasing cryptocurrency mining activities. Several platforms make mining services available to users. One such platform that provides JavaScript cryptocurrency miners for websites is CoinHive. Recently, we have analyzed a virus that infects user files with mining scripts. CoinHive is…
Read MoreCredit to Author: Jérôme Segura| Date: Mon, 26 Feb 2018 16:08:03 +0000
![]() | |
From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats. Categories: Tags: coin minerscoin-haveCoinbasecoinhivecrypto-lootcryptocurrencycryptominingdrive-bymalvertisingmalwaremonero |
The post The state of malicious cryptomining appeared first on Malwarebytes Labs.
Read MoreCredit to Author: hasherezade| Date: Fri, 23 Feb 2018 18:00:00 +0000
![]() | |
The Avzhan DDoS bot is back in the wild again, this time being dropped by a Chinese drive-by attack. In this post, we’ll take a deep dive into its functionality and compare the sample we captured with the one described in the past. Categories: Tags: avzhanBotbotnetddosdrive-by attackexploit kitmalware |
The post Avzhan DDoS bot dropped by Chinese drive-by attack appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Rajib Singha| Date: Mon, 19 Feb 2018 12:46:37 +0000
The Quick Heal Annual Threat Report 2018 is up and it puts together information that concerns individuals and business owners alike. It gives an insight into how the cybersecurity landscape shaped up in 2017 and how it is going to be in 2018. This infographic presents a quick overview of…
Read MoreCredit to Author: Windows Defender ATP| Date: Wed, 14 Feb 2018 14:43:26 +0000
At 12:46 a.m. local time on February 3, a Windows 7 Pro customer in North Carolina became the first would-be victim of a new malware attack campaign for Trojan:Win32/Emotet. In the next 30 minutes, the campaign tried to attack over a thousand potential victims, all of whom were instantly and automatically protected by Windows Defender
Read MoreCredit to Author: Shriram Munde| Date: Wed, 14 Feb 2018 09:10:30 +0000
Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this…
Read MoreCredit to Author: Gleb Malygin| Date: Tue, 13 Feb 2018 16:00:00 +0000
![]() | |
New malicious apps appear in Google Play abusing Kotlin, the “safest” official programming language for the Android. Categories: Tags: AndroidGoogle Playkotlinmalware |
The post Kotlin-based malicious apps penetrate Google market appeared first on Malwarebytes Labs.
Read More