Results for 'phishing '
Remote Monitoring & Management software used in phishing attacks
February 13, 2024 - Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.
How to recognize AI-generated phishing mails
December 26, 2023 - Cybercriminals now have AI to write their phishing emails, which might well improve their success rates. Here's what to watch out for.
Malwarebytes wins every Q2 MRG Effitas award & scores 100% on new phishing test
September 14, 2023 - MRG Effitas, a world leader in independent IT research, published their anti-malware efficacy assessment results for Q2 2023. Malwarebytes Endpoint Protection (EP) achieved the...
Microsoft Teams used in phishing campaign to bypass multi-factor authentication
August 4, 2023 - Attackers believed to have ties to Russia’s Foreign Intelligence Service (SVR) are using Microsoft Teams chats as credential theft phishing lures....
Phishing campaigns are using AMP URLs to avoid detection
August 3, 2023 - Researchers have found a new phishing tactic which uses Google Accelerated Mobile Pages (AMP) to make URLs look trustworthy. The tactic...
UPS warns customers of phishing attempts after data accessed
June 22, 2023 - UPS Canada is warning customers in Canada of potential data exposure and the risk of phishing. People have started to receive...
Phishing scam takes $950k from DoorDash drivers
June 19, 2023 - A particularly nasty slice of phishing, scamming, and social engineering is responsible for DoorDash drivers losing a group total of around...
Introducing Malwarebytes Mobile Security for Business: How to find malware and stop phishing attacks on smartphones and ChromeOS
February 7, 2023 - Malwarebytes is excited to announce Malwarebytes Mobile Security for Business, which extends our award-winning endpoint protection to mobile devices. Don’t get...
QBot uses zero-day MotW bypass in phishing campaign
November 21, 2022 - QBot, an infostealer-turned-dropper malware, is being successfully dropped onto affected systems, thanks to a zero-day bypass once used by cybercriminals in Magniber...