It’s been a busy few weeks for facial recognition technology. Its oft-maligned abilities frequently wind up in tales of privacy invasion,…
Month: May 2021
Revisiting the NSIS-based crypter
This blog post was authored by hasherezade NSIS (Nullsoft Scriptable Install System) is a framework dedicated to creating software installers. It…
A week in security (May 24 -30)
Last week on Malwarebytes Labs we discussed VPN Android apps, how even the FBI has to deal with insider threats, Chrome’s…
Threat spotlight: Conti, the ransomware used in the HSE healthcare attack
On the 14th of May, the Health Service Executive (HSE), Ireland’s publicly funded healthcare system, fell victim to a Conti ransomware…
SolarWinds attackers launch new campaign
Nobelium is a synthetic chemical element with the symbol No and atomic number 102. It is named in honor of Alfred…
RMM software: What is it and do you need it?
As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns, the…
Healthcare service faces test of willpower with Ransomware authors
Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated with…
Falsifying and weaponizing certified PDFs
The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value comes…
What is encryption? And why it matters in a VPN
Encryption is a term used to describe the methods that hide the true meaning of messages using code, especially to prevent…
How to delete your Twitter account: the deactivation process
You may decide to delete your Twitter account, because social media isn’t for everyone. Perhaps you set up an account to…