MalwareBytes

MalwareBytesSecurity

Hundreds of counterfeit online shoe stores injected with credit card skimmer

Credit to Author: Jérôme Segura| Date: Tue, 10 Dec 2019 17:30:50 +0000

A Magecart credit card skimmer was found injected into hundreds of counterfeit, brand-name shoe stores—a one-two punch of victimization for users first duped with fake goods then stripped of their personal data.

Categories:

Tags:

(Read more…)

The post Hundreds of counterfeit online shoe stores injected with credit card skimmer appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Please don’t buy this: smart doorbells

Credit to Author: David Ruiz| Date: Mon, 09 Dec 2019 17:15:56 +0000

This holiday season, please reconsider buying smart doorbells to protect your online shipments. The cybersecurity and privacy risks are too severe.

Categories:

Tags:

(Read more…)

The post Please don’t buy this: smart doorbells appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (December 2 – December 8)

Credit to Author: Malwarebytes Labs| Date: Mon, 09 Dec 2019 16:47:06 +0000

A roundup of the previous week’s security blogs and other news, including a new ransomware, an explanation of containerization, fixing leaky buckets, jewelry heists, and more.

Categories:

Tags:

(Read more…)

The post A week in security (December 2 – December 8) appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Fake Elder Scrolls Online developers go phishing on PlayStation

Credit to Author: Christopher Boyd| Date: Fri, 06 Dec 2019 20:29:26 +0000

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Categories:

Tags:

(Read more…)

The post Fake Elder Scrolls Online developers go phishing on PlayStation appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Report: Organizations remain vulnerable to increasing insider threats

Credit to Author: Jovi Umawing| Date: Thu, 05 Dec 2019 16:00:00 +0000

The risk and challenges insider threats pose to organizations are ever present, even before tech as we know it existed. The age of digitization only made it higher and far-reaching. How has insider threats evolved over time? Where are we now in terms of mitigating insider threat risk? Are businesses really doing something about it? We answer such questions—and more—in this post.

Categories:

Tags:

(Read more…)

The post Report: Organizations remain vulnerable to increasing insider threats appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Explained: What is containerization?

Credit to Author: Pieter Arntz| Date: Wed, 04 Dec 2019 17:00:00 +0000

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Categories:

Tags:

(Read more…)

The post Explained: What is containerization? appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

There’s an app for that: web skimmers found on PaaS Heroku

Credit to Author: Jérôme Segura| Date: Wed, 04 Dec 2019 16:00:00 +0000

Cybercriminals are abusing platform-as-a-service (PaaS) cloud provider Heroku to build web skimming apps and steal customer data.

Categories:

Tags:

(Read more…)

The post There’s an app for that: web skimmers found on PaaS Heroku appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

New version of IcedID Trojan uses steganographic payloads

Credit to Author: Threat Intelligence Team| Date: Tue, 03 Dec 2019 18:06:13 +0000

We take a deep dive into the IcedID Trojan, describing the new payloads of this advanced malware.

Categories:

Tags:

(Read more…)

The post New version of IcedID Trojan uses steganographic payloads appeared first on Malwarebytes Labs.

Read More