Coronavirus campaigns lead to surge in malware threats, Labs report finds

Credit to Author: David Ruiz| Date: Mon, 01 Jun 2020 15:00:00 +0000

Our latest, special edition for our quarterly CTNT report focuses on recent, increased malware threats which all have one, big thing in common—using coronavirus as a lure.

Categories:

Tags:

(Read more…)

The post Coronavirus campaigns lead to surge in malware threats, Labs report finds appeared first on Malwarebytes Labs.

Read more

Would ‘Medicare for All’ help secure health data?

Credit to Author: Adam Kujawa| Date: Tue, 26 Nov 2019 20:30:10 +0000

Beyond the usual arguments on this subject, we wanted to ask the question: Are there any security risks we need to be worried about if the United States were to switch to ‘Healthcare for All’ policies?

Categories:

Tags:

(Read more…)

The post Would ‘Medicare for All’ help secure health data? appeared first on Malwarebytes Labs.

Read more

Malwarebytes Labs wins best cybersecurity vendor blog at InfoSec’s European Security Blogger Awards

Credit to Author: Christopher Boyd| Date: Wed, 05 Jun 2019 19:21:07 +0000

The annual EU Security Blogger Awards results are in, and Malwarebytes Labs took home a trophy! Read on to find out who won in which categories.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs wins best cybersecurity vendor blog at InfoSec’s European Security Blogger Awards appeared first on Malwarebytes Labs.

Read more

Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Oct 2018 07:01:00 +0000

The quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report is here! Learn how Q3 2018 marked a major turning point in cybercrime trends—especially for businesses.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3 appeared first on Malwarebytes Labs.

Read more

Labs report: summer ushers in unprecedented season of breaches

Credit to Author: Malwarebytes Labs| Date: Thu, 12 Oct 2017 16:00:27 +0000

In this edition of the Malwarebytes Cybercrime Tactics and Techniques report, we saw a number of high profile breaches targeting the personal information of hundreds of millions of people. We also observed shifts in malware distribution, the revival of some old families, and found cases of international tech support scams.

Categories:

Tags:

(Read more…)

The post Labs report: summer ushers in unprecedented season of breaches appeared first on Malwarebytes Labs.

Read more

Report: Second quarter dominated by ransomware outbreaks

Credit to Author: Malwarebytes Labs| Date: Thu, 06 Jul 2017 19:06:53 +0000

The second quarter of 2017 left the security world wondering, “What the hell happened?” With leaks of government-created exploits being deployed against users in the wild, a continued sea of ransomware constantly threatening our ability to work online, and the lines between malware and potentially unwanted programs continuing to blur, every new incident was a wakeup call.In this report, we are going to discuss some of the most important trends, tactics, and attacks of Q2 2017, including an update on ransomware, what is going on with all these exploits, and a special look at all the breaches that happened this quarter.

Categories:

Tags:

(Read more…)

The post Report: Second quarter dominated by ransomware outbreaks appeared first on Malwarebytes Labs.

Read more

Petya-esque ransomware is spreading across the world

Credit to Author: Malwarebytes Labs| Date: Tue, 27 Jun 2017 20:26:29 +0000

Ringing in with echoes of WannaCry, Petya (or Petrwrap, NotPetya), is a new ransomware strain outbreak affecting many users around the world.

Categories:

Tags:

(Read more…)

The post Petya-esque ransomware is spreading across the world appeared first on Malwarebytes Labs.

Read more

LatentBot piece by piece

Credit to Author: Malwarebytes Labs| Date: Thu, 08 Jun 2017 15:00:53 +0000

LatentBot is a multi-modular Trojan written in Delphi and known to have been around since 2013. Recently, we captured and dissected a sample distributed by RIG Exploit Kit. In this post we will describe its modules by taking apart several layers of obfuscation and encryption in order to reveal their true nature.

Categories:

Tags:

(Read more…)

The post LatentBot piece by piece appeared first on Malwarebytes Labs.

Read more