MalwareBytes

MalwareBytesSecurity

Spelevo exploit kit debuts new social engineering trick

Credit to Author: Jérôme Segura| Date: Wed, 18 Dec 2019 16:00:00 +0000

In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.

Categories:

Tags:

(Read more…)

The post Spelevo exploit kit debuts new social engineering trick appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

New Consumer Online Privacy Rights Act (COPRA) would empower American users

Credit to Author: David Ruiz| Date: Tue, 17 Dec 2019 17:28:37 +0000

The Consumer Online Privacy Rights Act (COPRA) would give everyday Americans the right to sue a company that violated their privacy rights, extending enforcement capabilities directly to the public.

Categories:

Tags:

(Read more…)

The post New Consumer Online Privacy Rights Act (COPRA) would empower American users appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Mac threat detections on the rise in 2019

Credit to Author: Thomas Reed| Date: Mon, 16 Dec 2019 18:40:06 +0000

For the first time ever, Mac threats broke into Malwarebytes’ top five overall detections of 2019. Take a look at this and other telemetry that shows Mac malware is certainly on the rise.

Categories:

Tags:

(Read more…)

The post Mac threat detections on the rise in 2019 appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (December 9 – 15)

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Dec 2019 17:08:30 +0000

A roundup of cybersecurity news from December 9 – 15, including smart doorbell concerns, a new credit card skimmer vulnerability, and a deep dive into Ryuk ransomware.

Categories:

Tags:

(Read more…)

The post A week in security (December 9 – 15) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

New Women in CyberSecurity (WiCyS) veterans program aims to bridge skills gap, diversify sector

Credit to Author: Jovi Umawing| Date: Fri, 13 Dec 2019 17:02:07 +0000

A shortage of skilled professionals is a recognized, longstanding problem in the cybersecurity industry—but does it hold merit? Nonprofit Women in CyberSecurity challenge the notion with a new program connecting skilled veterans to security jobs.

Categories:

Tags:

(Read more…)

The post New Women in CyberSecurity (WiCyS) veterans program aims to bridge skills gap, diversify sector appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

5 tips for building an effective security operations center (SOC)

Credit to Author: Gilad Maayan| Date: Fri, 13 Dec 2019 16:00:00 +0000

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Categories:

Tags:

(Read more…)

The post 5 tips for building an effective security operations center (SOC) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Threat spotlight: The curious case of Ryuk ransomware

Credit to Author: Jovi Umawing| Date: Thu, 12 Dec 2019 22:33:53 +0000

From comic book death god to ransomware baddie, Ryuk ransomware remains a mainstay when organizations find themselves in a crippling malware pinch. We look at Ryuk’s origins, attack methods, and how to protect against this ever-present threat.

Categories:

Tags:

(Read more…)

The post Threat spotlight: The curious case of Ryuk ransomware appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

The little-known ways mobile device sensors can be exploited by cybercriminals

Credit to Author: Logan Strain| Date: Wed, 11 Dec 2019 17:51:03 +0000

Mobile device sensors offer great utility to users—from taking pictures and commanding voice assistants to determining which direction to flip your screen. However, they harbor little-known vulnerabilities that could be exploited by crafty cybercriminals.

Categories:

Tags:

(Read more…)

The post The little-known ways mobile device sensors can be exploited by cybercriminals appeared first on Malwarebytes Labs.

Read More