It’s been an astonishing few days for Facebook. They’ve seen both an app and their enterprise certificate removed and revoked with…
Month: January 2019
Analyzing a new stealer written in Golang
Golang (Go) is a relatively new programming language, and it is not common to find malware written in it. However, new…
Interview with a malware hunter: Jérôme Segura
In our series “Interview with a malware hunter,” our feature role today goes to Jérôme Segura, Malwarebytes’ Head of Threat Intelligence…
Apple’s FaceTime privacy bug allowed possible spying
Social media caught fire yesterday as the news of a new Apple bug spread. It seemed that there was a flaw…
What does ‘consent to tracking’ really mean?
Thanks to Jerome Boursier for contributions. Post GDPR, many social media platforms will ask end users to consent to some form of…
A week in security (January 21 – 27)
Last week on the Malwarebytes Labs blog, we took a look at Modlishka, the latest hurdle in two-factor authentication (2FA), the…
Sly criminals package ransomware with malicious ransom note
Ransomware continues to show signs of evolution. From a simple screen locker to a highly-sophisticated data locker, ransomware has now become…
A user’s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)
Potentially Unwanted Programs (PUPs): the name says it all. While the programs themselves might have legitimate uses, their vendors often use…
2019 State of Malware report: Trojans and cryptominers dominate threat landscape
Each quarter, the Malwarebytes Labs team gathers to share intel, statistics, and analysis of the tactics and techniques made popular by…
Browser push notifications: a feature asking to be abused
“I’m seeing a lot of ads popping up in the corner of my screen, and the Malwarebytes scan does not show…