Last year, we documented a new social engineering toolkit we called “Domen” being used in the wild. Threat actors were using…
Month: February 2020
Stalkerware and online stalking are accepted by Americans. Why?
Despite warnings from domestic abuse networks, privacy rights advocates, and a committed faction of cybersecurity vendors, Americans may be accepting and…
Mac adware is more sophisticated and dangerous than traditional Mac malware
As the data revealed in our State of Malware report showed, Mac threats are on the rise, but they are not…
Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server
Threat actors love to abuse legitimate brands and infrastructure—this, we know. Last year we exposed how web skimmers had found their…
Introducing Lock and Code: a Malwarebytes Labs podcast
Intrepid Labs readers might be happy to know that we’re stepping into territory long-requested and desired: we’re launching a podcast. Malwarebytes…
Biotech health care innovations meet security challenges
The level and speed of innovations taking place in the biotech industry are baffling. On the one hand, it makes us…
A week in security (February 17 – 23)
Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from the…
Threat spotlight: RobbinHood ransomware takes the driver’s seat
Despite their name, the RobbinHood cybercriminal gang is not stealing from the rich to give to the poor. Instead, these ransomware…
Rudy Giuliani’s Twitter mishaps invite typosquatters and scammers
Former cybersecurity czar Rudy Giuliani has been targeted by typosquatters on Twitter, thanks to copious misspellings and other keyboarding errors made…
A week in security (February 10 – 16)
Last week on Malwarebytes Labs, we explained how to battle online coronavirus scams with facts, discussed the persistent re-infection techniques of…