In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware…

We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to…

If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has…

Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…

VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now….

Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies…

Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of…

Update: Twitter only recommends that verified users enable 2FA on their accounts. They do, however, need to have a verified phone…

Comments on the Malwarebytes labs blog can be well written, valuable additions to our published work, and sometimes provide additional data…

The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from…