ALL POSTS A week in security (Jul 31 – Aug 06) Malwarebytes Labs August 8, 2016 0 Comments Last week, we did an in-depth analysis of Smoke Loader, took a closer look into Neutrino exploit kit’s jQueryGate, found a… The reality of ransomware: an in-depth study Christopher Boyd August 5, 2016 0 Comments We recently sponsored a deep-dive study conducted by Osterman Research on the subject of Ransomware, and the results are a stark insight… Smoke Loader – downloader with a smokescreen still alive Malwarebytes Labs August 5, 2016 0 Comments This time we will have a look at another payload from recent RIG EK campaign. It is Smoke Loader (Dofoil), a… PUP Friday: Adware family EoRezo Pieter Arntz August 5, 2016 0 Comments EoRezo which is sometimes called Tuto4PC, is a family of software bundles that typically offers something useful for free and then… The curious case of recurring “Page disabled” Facebook scams Jovi Umawing August 4, 2016 0 Comments Remember those fake Facebook Security pages we’ve documented earlier this year? Here’s a quick refresher if not: Recently, we noticed a… A look into Neutrino EK’s jQueryGate Jérôme Segura August 3, 2016 0 Comments In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a… Tech support scams, two for the price of one Pieter Arntz August 2, 2016 0 Comments If you have read the blog post about Tech Support Scammers using the Winlogon Shell registry value, you know the basics… Google’s featured snippets abused by SEO scammers Jérôme Segura August 1, 2016 0 Comments Many people wonder why websites, even very small ones such as personal blogs, ever get hacked. While there are many possible… A week in security (Jul 24 – Jul 30) Malwarebytes Labs August 1, 2016 0 Comments Last week, we talked about a donation 419 scam, gave an overview of what an APT is, counted the ways one… Previous 1 … 471 472 473 474 475 … 619 Next Contributors Threat Center Podcast Glossary Scams