MalwareBytes

MalwareBytesSecurity

Leaks and breaches: a roundup

Credit to Author: Christopher Boyd| Date: Mon, 03 Jun 2019 16:47:11 +0000

There’s been some huge leaks and breaches over the last few days, impacting everything from regular logins to important financial documents. What’s the fallout?

Categories:

Tags:

(Read more…)

The post Leaks and breaches: a roundup appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Hidden Bee: Let’s go down the rabbit hole

Credit to Author: hasherezade| Date: Fri, 31 May 2019 17:32:57 +0000

The complex and sophisticated custom malware, Hidden Bee, is a Chinese cryptominer that recently released an updated sample. We unpack the sample to look at the functionality of its loader and compare it against earlier versions.

Categories:

Tags:

(Read more…)

The post Hidden Bee: Let’s go down the rabbit hole appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Ransomware isn’t just a big city problem

Credit to Author: Adam Kujawa| Date: Fri, 31 May 2019 15:00:00 +0000

The city of Baltimore has experienced a very public ransomware attack. But in a season of increasing ransomware detections among organizations, they’re not alone. See which cites have been most impacted by ransomware and what organizations can do to develop resilience against attacks.

Categories:

Tags:

(Read more…)

The post Ransomware isn’t just a big city problem appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Everything you need to know about ATM attacks and fraud: Part 1

Credit to Author: Jovi Umawing| Date: Wed, 29 May 2019 15:00:00 +0000

If you’re familiar with skimming, you may have also heard of shimming, card trapping, and cash trapping. These are attacks and scams targeted at ATMs. Part 1 of our series explores various ATM attack scenarios and explains what users should look out for when using an ATM.

Categories:

Tags:

(Read more…)

The post Everything you need to know about ATM attacks and fraud: Part 1 appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

NIST’s privacy framework lets privacy tell its own story

Credit to Author: David Ruiz| Date: Wed, 29 May 2019 18:51:40 +0000

As the Senate sits on no fewer than four data privacy bills that their own members wrote—with no plans to vote on any—and as the world’s largest social media company braces for an anticipated multibillion-dollar privacy blunder, the US National Institute of Standards and Technology (NIST) has published what it calls a “privacy framework” draft.

Categories:

Tags:

(Read more…)

The post NIST’s privacy framework lets privacy tell its own story appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Employee education strategies that work to change behavior

Credit to Author: Kacy Zurkus| Date: Tue, 28 May 2019 15:25:52 +0000

Using technology alone to combat cyberattacks is not enough. That’s why employee education on security awareness should be an integral part of any company’s cybersecurity policy.

Categories:

Tags:

(Read more…)

The post Employee education strategies that work to change behavior appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Medical industry struggles with PACS data leaks

Credit to Author: Vasilios Hioureas| Date: Fri, 24 May 2019 18:05:21 +0000

PACS servers are often used to store and transmit patient data. But how is their security implemented? We take a look at case of how poor setup can easily lead to data leaks.

Categories:

Tags:

(Read more…)

The post Medical industry struggles with PACS data leaks appeared first on Malwarebytes Labs.

Read More