Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Oct 2018 07:01:00 +0000

The quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report is here! Learn how Q3 2018 marked a major turning point in cybercrime trends—especially for businesses.

Categories:

Tags:

(Read more…)

The post Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3 appeared first on Malwarebytes Labs.

Read more

When Endpoint Detection and Response (EDR) is not enough

Credit to Author: Simone Spencer| Date: Tue, 09 Oct 2018 15:00:00 +0000

As cybercriminals continue to validate the reality that no security is going to stop every threat every time, companies are turning to endpoint detection and response solutions to close the gap. But is it enough to keep businesses and their data protected?

Categories:

Tags:

(Read more…)

The post When Endpoint Detection and Response (EDR) is not enough appeared first on Malwarebytes Labs.

Read more

Fileless malware: part deux

Credit to Author: Vasilios Hioureas| Date: Fri, 05 Oct 2018 15:00:00 +0000

In part two of this series on fileless malware, our malware analyst walks readers through two demonstrations of fileless malware attacks and shows the problems with detecting them using static signatures.

Categories:

Tags:

(Read more…)

The post Fileless malware: part deux appeared first on Malwarebytes Labs.

Read more

Black Hat USA 2018: ransomware is still the star

Credit to Author: Malwarebytes Labs| Date: Wed, 15 Aug 2018 16:00:02 +0000

A recap of the Malwarebytes’ team experience at the Black Hat conference in Las Vegas, including top trends, topics, and interesting discussions.

Categories:

Tags:

(Read more…)

The post Black Hat USA 2018: ransomware is still the star appeared first on Malwarebytes Labs.

Read more

Osiris dropper found using process doppelgänging

Credit to Author: hasherezade| Date: Thu, 09 Aug 2018 18:52:57 +0000

Process doppleganging, a rare technique of impersonating a process, was discovered last year, but hasn’t been seen much in the wild since. It was an interesting surprise, then, to discover its use in a dropper of the Osiris banking Trojan. We unpack the code to show how malware authors used this process.

Categories:

Tags:

(Read more…)

The post Osiris dropper found using process doppelgänging appeared first on Malwarebytes Labs.

Read more

Introducing: Malwarebytes Browser Extension

Credit to Author: Malwarebytes Labs| Date: Thu, 26 Jul 2018 17:21:22 +0000

Malwarebytes Browser Extensions (BETA) are available in the official web stores for Chrome and Firefox. Read what they can do for you, and try one, if you haven’t already..

Categories:

Tags:

(Read more…)

The post Introducing: Malwarebytes Browser Extension appeared first on Malwarebytes Labs.

Read more

Mac malware targets cryptomining users

Credit to Author: Thomas Reed| Date: Mon, 02 Jul 2018 18:36:10 +0000

A new Mac malware called OSX.Dummy is being distributed on cryptomining chat groups that, even after being removed, leaves behind remnants for future malware to find.

Categories:

Tags:

(Read more…)

The post Mac malware targets cryptomining users appeared first on Malwarebytes Labs.

Read more

PSA: Users with landlines are more vulnerable to scams

Credit to Author: Jean Taggart| Date: Wed, 06 Jun 2018 15:00:00 +0000

Anyone still using a home phone be warned: having landlines makes you particularly vulnerable to scams. Read on to learn how to keep your landline but stay safe from cyberattacks.

Categories:

Tags:

(Read more…)

The post PSA: Users with landlines are more vulnerable to scams appeared first on Malwarebytes Labs.

Read more

Malwarebytes CrackMe 2: contest summary

Credit to Author: hasherezade| Date: Tue, 22 May 2018 16:00:00 +0000

About three weeks ago, we published our second CrackMe, which has triggered a lot of interest, and many high-quality write-up submissions. In this post, we summarize the contest and comment on the submissions. Whose write-up won? Read on to find out.

Categories:

Tags:

(Read more…)

The post Malwarebytes CrackMe 2: contest summary appeared first on Malwarebytes Labs.

Read more

Vote for Malwarebytes Labs: European Security Blogger Awards 2018

Credit to Author: Christopher Boyd| Date: Mon, 21 May 2018 15:00:00 +0000

Malwarebytes Labs has been nominated for the Best Corporate Security Blog in the 2018 European Security Blogger Awards. Cast your vote for your favorite blog, and spread the word!

Categories:

Tags:

(Read more…)

The post Vote for Malwarebytes Labs: European Security Blogger Awards 2018 appeared first on Malwarebytes Labs.

Read more

Mobile Menace Monday: re-emergence of a fake Android AV

Credit to Author: Nathan Collier| Date: Mon, 07 May 2018 20:46:35 +0000

Way back in early 2013, a new antivirus (AV) company emerged into the mobile security software industry that had everyone perplexed. It seemed like a fake Android AV, but received certification by a reputable AV testing organization! Now, five years later, it’s back. Here’s why you shouldn’t trust it.

Categories:

Tags:

(Read more…)

The post Mobile Menace Monday: re-emergence of a fake Android AV appeared first on Malwarebytes Labs.

Read more