Multiple news reports about the defeat of two-factor authentication (2FA) have been making rounds lately. In November 2018, our friends at…
Month: January 2019
A week in security (January 14 – 20)
Last week on the Malwarebytes Labs blog, we took a look at how the government shutdown is influencing cybersecurity jobs, Advanced Persistent…
Hosting malicious sites on legitimate servers: How do threat actors get away with it?
How do threat actors manage to get their sites and files hosted on legitimate providers’ servers? I have asked myself this…
Collection 1 data breach: what you need to know
Yesterday, news broke that the largest data dump in history had been discovered, with more than 770 million people’s Personally Identifiable Information…
Improved Fallout EK comes back after short hiatus
[Edit 2019-01-24] Fallout EK introduces a new dropper to facilitate the final payload retrieval. This update replaces the plain MZ we…
The Advanced Persistent Threat files: APT10
We’ve heard a lot about Advanced Persistent Threats (APTs) over the past few years. As a refresher, APTs are prolonged, aimed…
How the government shutdown is influencing cybersecurity jobs
As of this writing, the government shutdown of 2019 is the longest ever in America. The only good news about this…
Government shutdown impacts .gov websites, puts Americans in danger
If you are in the United States, then you likely already know that we are on our 24th day of a…
A week in security (January 7 – 13)
Last week on the Malwarebytes Labs blog, we took a look at the Ryuk ransomware attack causing trouble over the holidays,…
Luas data ransom: the hacker who cried wolf?
In a terrible start to the year for Irish tram firm Luas, their site was compromised a week ago and adorned with…