Exploit kit (EK) activity continues to surprise us as the weather cools, the leaves change, and we move into the fall of…

In our first post in a series about vital infrastructure, we aim to explore how secure our voting machines—and our votes…

Last week on Malwarebytes Labs, we went over how to build your own motion-activated security camera, wondered whether FIDO is the future…

Back in April, we talked about the wealth of options available to Russian hackers and others launching social engineering campaigns, whether…

FIDO, short for Fast IDentity Online, is an industry consortium started in 2013 to address the lack of interoperability among strong…

Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you…

Once again, it’s that time of year: time for the quarterly Malwarebytes Labs Cybercrime Tactics and Techniques Report. Strap in your…

Last week, we warned you away from some dubious Doctor Who streams, explained how Endpoint Detection and Response may not be…

Organizations are no stranger to insider threats. In fact, for those who have been around long before the Internet, workplace violence,…

This blog post was authored by @hasherezade and Jérôme Segura. MikroTik, a Latvian company that makes routers and ISP wireless systems, has been dealing…