Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…
Month: August 2018
Reversing malware in a custom format: Hidden Bee elements
Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can…
Fileless malware: getting the lowdown on this insidious threat
Traditionally, malware attacks as we have always known them are files written to disk in one form or another that require…
Official Cardi B website plagued by spammers
We come bearing tidings of proper website maintenance and general housekeeping for singer Cardi B (or rather, for her web development…
Mobile Menace Monday: FakeGift is the gift that keeps on frustrating
Last spring, we found yet another piece of riskware on Google Play we call Android/PUP.Riskware.FakeGift. Based on Hindi characters found in…
A week in security (August 20 – August 26)
Last week on Labs, we took a look at insider threats, doubled back on the privacy of search browser extensions, profiled…
Green card scams: preying on the desperate
Thanks to @nullcookies for providing leads. Most online scams depend on two things for success: a broken or otherwise onerous process…
Can search extensions keep your searches private?
One of the most common things most of us do on the Internet is search, whether we are looking up the…
Badgelife: A Defcon 26 retrospective
One more year gone, one more Defcon completed. Defcon is the longest-running security conference in existence and one that I have…
The digital entropy of death: BSides Manchester
Last week, I gave a talk at BSides Manchester based on a previous blog series for Malwarebytes Labs called “The digital…