MalwareBytes

MalwareBytesSecurity

APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT

Credit to Author: Threat Intelligence Team| Date: Mon, 16 Mar 2020 15:00:00 +0000

We look at a spear phishing attack from APT36, an Advanced Persistent Threat group posing as the government of India and offering guidance on coronavirus. Instead, users are infected with a Crimson RAT that steals data.

Categories:

Tags:

(Read more…)

The post APT36 jumps on the coronavirus bandwagon, delivers Crimson RAT appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

The effects of climate change on cybersecurity

Credit to Author: Pieter Arntz| Date: Fri, 13 Mar 2020 18:55:13 +0000

We explore the relationship between climate change and cybersecurity, two of the major issues of our time. Does cybersecurity actually contribute to global warming? Or can climate change illicit an uptick in cybercrime? We take a look.

Categories:

Tags:

(Read more…)

The post The effects of climate change on cybersecurity appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Coronavirus impacts security conferences and events: check your schedule

Credit to Author: Christopher Boyd| Date: Thu, 12 Mar 2020 18:02:04 +0000

We look at upcoming cancellations, postponements, and moves to virtual for security conferences in the wake of the coronavirus pandemic.

Categories:

Tags:

(Read more…)

The post Coronavirus impacts security conferences and events: check your schedule appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

RemoteSec: achieving on-prem security levels with cloud-based remote teams

Credit to Author: Dan Macharia| Date: Thu, 12 Mar 2020 16:53:43 +0000

Times are quickly changing and many teams are scrambling to embrace a shift to remote work. How will security protocols change? Time to move from on-prem to RemoteSec.

Categories:

Tags:

(Read more…)

The post RemoteSec: achieving on-prem security levels with cloud-based remote teams appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Securing the MSP: best practices for vetting cybersecurity vendors

Credit to Author: William Tsing| Date: Wed, 11 Mar 2020 15:44:33 +0000

How do you spot the unicorn cybersecurity vendors amongst the bad apples? We show MSPs the ins and outs of vendor vetting.

Categories:

Tags:

(Read more…)

The post Securing the MSP: best practices for vetting cybersecurity vendors appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Rocket Loader skimmer impersonates CloudFlare library in clever scheme

Credit to Author: Jérôme Segura| Date: Tue, 10 Mar 2020 15:46:13 +0000

URLs can be deceiving, but the one used to mimic CloudFlare’s Rocket Loader in the latest Magecart attack takes it to a whole new level.

Categories:

Tags:

(Read more…)

The post Rocket Loader skimmer impersonates CloudFlare library in clever scheme appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (March 2 – 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Mar 2020 20:07:46 +0000

A roundup of the previous week’s security headlines, including the introduction of a new series on child identity theft, an examination of law enforcement’s cybersecurity woes, a progress check on our stalkerware initiative, and more coronavirus scammers on the prowl.

Categories:

Tags:

(Read more…)

The post A week in security (March 2 – 8) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

International Women’s Day: awareness of stalkerware, monitoring, and spyware apps on the rise

Credit to Author: David Ruiz| Date: Mon, 09 Mar 2020 15:00:00 +0000

For International Women’s Day, Malwarebytes is measuring the impact of our own campaign to raise awareness and protect users. These are the numbers on stalkerware, monitoring, and spyware apps.

Categories:

Tags:

(Read more…)

The post International Women’s Day: awareness of stalkerware, monitoring, and spyware apps on the rise appeared first on Malwarebytes Labs.

Read More