We’ve previously discussed threats to managed service providers (MSPs), covering their status as a valuable secondary target to both an assortment…
Month: January 2020
Spear phishing 101: what you need to know
Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means of…
Explained: the strengths and weaknesses of the Zero Trust model
In a US court of law, the accused are deemed to be innocent until proven guilty. In a Zero Trust security…
A week in security (January 20 – 26)
Last week on Malwarebytes Labs, we reported on a Ryuk ransomware attack on The Tampa Bay Times, a newspaper in Florida;…
Tampa Bay Times hit with Ryuk ransomware attack
Florida newspaper The Tampa Bay Times suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious…
Deepfakes laws and proposals flood US
In a rare example of legislative haste, roughly one dozen state and federal bills were introduced in the past 12 months…
WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation
Update [01-27-2020]: Shortly after this blog was published we noticed that a large part of the infrastructure behind this browlock was…
A week in security (January 13 – 19)
Last week on Malwarebytes Labs, we taught you how to prevent a rootkit attack, explained what data enrichment means, informed you…
Business in the front, party in the back: backdoors in elastic servers expose private data
It seems like every day we read another article about a data breach or leak of cloud storage exposing millions of…
Explained: data enrichment
How do your favorite brands know to use your first name in the subject line of their emails? Why do you…