A recently patched Internet Explorer vulnerability (CVE-2015-2419) has already made its way into the top exploit kit on the market, Angler…

There are lots of ways you can have a bad hair day with a mobile device – a rogue app from…

Desktops and laptops have long been major targets for viruses and other cyber attacks, but with the exponential growth and availability…

Update (08/11): Mac users are now being targeted by a newer version of this exploit. Original Post: Mozilla released a critical…

This post describes the process of unpacking a malicious payload delivered in a new spam campaign. I often observe malicious samples, distributed…

Update: We now have an in-depth analysis of this Malware on the blog. There’s a piece of email spam currently in circulation,…

The HackingTeam data leak was a treasure trove for threat actors. As we documented on this blog, it didn’t take long…

Disclaimer The following research is the result of a collaboration with ad-fraud fighting firm Sentrant. Analysts from both the Sentrant and Malwarebytes teams have…

We sometimes see Facebook Apps pages being used for phishing scams, and here’s one that’s been doing the rounds recently: apps(dot)facebook(dot)com/783348471781894 This apps…

Last week, Malwarebytes announced that our line of security products now support Windows 10, Microsoft’s latest operating system to date. If…