Acer, well known manufacturer of laptops, TVs, and other goods, has announced a long-running breach (active for nearly a year), targeting…
Month: June 2016
A week in security (Jun 12 – Jun 18)
Last week, we uncovered a truth about malvertising, briefed our readers on email spoofing, disclosed advanced phishing tactics used by PayPal…
A look at the Angler-less exploit kit scene
For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of…
Email spoofing
Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by…
Android Trojan FakeApp masquerading as legitimate
A variant of Android/Trojan.FakeApp is stealing the identities of popular applications (apps) such as TrueCaller and Torque Pro. As soon as…
zCrypt ransomware: under the hood
Ransomware has become the new norm for cyber-criminals. Every week there are fresh ransomware threats with new functionalities and improvements. zCrypt ransomware…
Advanced phishing tactics used to steal PayPal credentials
Phishers are back to using an old tactic in a new fashion to get hold of their victims’ credentials. One of…
Truth in malvertising: How to beat bad ads
Update 6.15.16: An earlier version of this article mentioned a specific adblocking product. Its inclusion was intended to be illustrative only,…
Introducing the brand new Malwarebytes Labs
Hey folks, Welcome to the new Malwarebytes Unpacked…err…Labs! It’s new, improved, and bigger than ever. Hope you like it. So why…
Neutrino exploit kit fills in for Angler EK in recent malvertising campaigns
Update (06/13/2016): Still no sign of Angler EK activity since late June 6th PST. In the meantime, the actor known as ihateclowns/SadClowns…