Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…

Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can…

Traditionally, malware attacks as we have always known them are files written to disk in one form or another that require…

We come bearing tidings of proper website maintenance and general housekeeping for singer Cardi B (or rather, for her web development…

Last spring, we found yet another piece of riskware on Google Play we call Android/PUP.Riskware.FakeGift. Based on Hindi characters found in…

Last week on Labs, we took a look at insider threats, doubled back on the privacy of search browser extensions, profiled…

Thanks to @nullcookies for providing leads. Most online scams depend on two things for success: a broken or otherwise onerous process…

One of the most common things most of us do on the Internet is search, whether we are looking up the…

One more year gone, one more Defcon completed. Defcon is the longest-running security conference in existence and one that I have…

Last week, I gave a talk at BSides Manchester based on a previous blog series for Malwarebytes Labs called “The digital…