ALL POSTS Chernobyl’s lessons for critical-infrastructure cybersecurity Seth Rosenblatt June 21, 2019 0 Comments This story originally ran on The Parallax on April 26, 2019.CHERNOBYL EXCLUSION ZONE, Ukraine—The stray dog looking directly at me was… Radiohead’s ransom response shows novel approach for ransomware victims David Ruiz June 20, 2019 0 Comments Last week, British rock band Radiohead thwarted an attempted digital ransom, in which unnamed hackers stole roughly 18 hours of unreleased… New Mac cryptominer Malwarebytes detects as Bird Miner runs by emulating Linux Thomas Reed June 20, 2019 0 Comments A new Mac cryptocurrency miner Malwarebytes detects as Bird Miner has been found in a cracked installer for the high-end music… Labs report: Malicious AI is coming—is the security world ready? Malwarebytes Labs June 19, 2019 0 Comments Imagine a world in which artificial intelligence has gone rogue—the robots have revolted against their masters and have now enslaved all… Smart cities, difficult choices: privacy and security on the grid Christopher Boyd June 18, 2019 0 Comments All is not well in the land of smart city planning, as the latest major planned development from Google’s sister company… A week in security (June 10 – 16) Malwarebytes Labs June 17, 2019 0 Comments Last week on Malwarebytes Labs, we revealed to readers the mindset of security pros as to why they lack confidence in… Trolls abuse Twitter Lists to collate their targets Jovi Umawing June 14, 2019 0 Comments I’ve been using Twitter for more than a decade. And one of its features that I find valuable is Lists. Turns… Adware and PUPs families add push notifications as an attack vector Pieter Arntz June 13, 2019 0 Comments Some existing families of potentially unwanted programs and adware have added browser push notifications to their weapons arsenal. Offering themselves up… MegaCortex continues trend of targeted ransomware attacks Pieter Arntz June 12, 2019 0 Comments MegaCortex is a relatively new ransomware family that continues the 2019 trend of threat actors developing ransomware specifically for targeted attacks… Previous 1 … 362 363 364 365 366 … 618 Next Contributors Threat Center Podcast Glossary Scams