For a couple of weeks, we have been observing a malvertising campaign that uses decoy websites to redirect users to the…
Month: February 2018
In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used…
A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and…
Noticing that your computer is running slow? While sometimes a telltale sign of malware infection, these days that seems doubly true….
While cryptocurrencies have been around for a long time and used for legitimate purposes, online criminals have certainly tarnished their reputation….
Last week on Malwarebytes Labs, we gave readers a primer on encryption, took a stab at that Deepfakes tool Internet users seem to…
A few weeks ago, we took a look at a forum dedicated to Deepfake clips where the site was pushing Coinhive…
The Avzhan DDoS bot has been known since 2010, but recently we saw it in wild again, being dropped by a…
During our web crawls we sometimes come across bizarre findings or patterns we haven’t seen before. This was the case with…
In today’s computing world, it is not a matter of “if” an organization will get compromised, but “when.” That’s why, in…