In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used…

For a couple of weeks, we have been observing a malvertising campaign that uses decoy websites to redirect users to the…

Noticing that your computer is running slow? While sometimes a telltale sign of malware infection, these days that seems doubly true….

A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and…

Last week on Malwarebytes Labs, we gave readers a primer on encryption, took a stab at that Deepfakes tool Internet users seem to…

While cryptocurrencies have been around for a long time and used for legitimate purposes, online criminals have certainly tarnished their reputation….

The Avzhan DDoS bot has been known since 2010, but recently we saw it in wild again, being dropped by a…

A few weeks ago, we took a look at a forum dedicated to Deepfake clips where the site was pushing Coinhive…

During our web crawls we sometimes come across bizarre findings or patterns we haven’t seen before. This was the case with…

In today’s computing world, it is not a matter of “if” an organization will get compromised, but “when.” That’s why, in…