Exploit kit (EK) activity continues to surprise us as the weather cools, the leaves change, and we move into the fall of…
Month: October 2018
Compromising vital infrastructure: how voting machines and elections are vulnerable
In our first post in a series about vital infrastructure, we aim to explore how secure our voting machines—and our votes…
A week in security (October 15 – 21)
Last week on Malwarebytes Labs, we went over how to build your own motion-activated security camera, wondered whether FIDO is the future…
Information operations on Twitter: new data released on election tampering
Back in April, we talked about the wealth of options available to Russian hackers and others launching social engineering campaigns, whether…
Is FIDO the future instrument to prove our identity?
FIDO, short for Fast IDentity Online, is an industry consortium started in 2013 to address the lack of interoperability among strong…
How to build your own motion-activated security camera
Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you…
Malwarebytes Labs Cybercrime Tactics and Techniques Report (CTNT) shows shift to business targets in Q3
Once again, it’s that time of year: time for the quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report. Strap in your…
A week in security (October 8 – 14)
Last week, we warned you away from some dubious Doctor Who streams, explained how Endpoint Detection and Response may not be…
Workplace violence: the forgotten insider threat
Organizations are no stranger to insider threats. In fact, for those who have been around long before the Internet, workplace violence,…
Fake browser update seeks to compromise more MikroTik routers
This blog post was authored by @hasherezade and Jérôme Segura. MikroTik, a Latvian company that makes routers and ISP wireless systems, has been dealing…