Criminals love to abuse legitimate services—especially platform-as-a-service (Paas) cloud providers—as they are a popular and reliable hosting commodity used to support…
Year: 2019
Last week on Malwarebytes Labs, we discussed why the notion of “data as property” may potentially hurt more than help, homed…
We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor…
DISCLAIMER: This post is not partisan, but rather focuses on risk assessment based on history and what threats we are facing…
Last week on Malwarebytes Labs, we looked at stalkerware’s legal enforcement problem, announced our cooperation with other security vendors and advocacy…
In mid-November, Democratic presidential hopeful Andrew Yang unveiled a four-prong policy approach to solving some of today’s thornier tech issues, such…
You may not have noticed, but Internet of Things (IoT) rules and regulations are coming whether manufacturers want them or not….
When your battery is dying and you’re nowhere near a power outlet, would you connect your phone to any old USB…
Heading into the holiday shopping season, we have been tracking increased activity from a threat group registering domains for skimming and…
Deepfakes haven’t quite lost the power to surprise, but given their wholesale media saturation in the last year or so, there’s…