ALL POSTS Encryption 101: ShiOne ransomware case study Vasilios Hioureas February 28, 2018 0 Comments In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used… Human Factor Podcast: Jenny Radcliffe and Chris Boyd Christopher Boyd February 27, 2018 0 Comments A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and… How to protect your computer from malicious cryptomining Pieter Arntz February 27, 2018 0 Comments Noticing that your computer is running slow? While sometimes a telltale sign of malware infection, these days that seems doubly true…. The state of malicious cryptomining Jérôme Segura February 26, 2018 0 Comments While cryptocurrencies have been around for a long time and used for legitimate purposes, online criminals have certainly tarnished their reputation…. A week in security (February 19 – February 25) Malwarebytes Labs February 26, 2018 0 Comments Last week on Malwarebytes Labs, we gave readers a primer on encryption, took a stab at that Deepfakes tool Internet users seem to… Deepfakes FakeApp tool (briefly) includes cryptominer Christopher Boyd February 23, 2018 0 Comments A few weeks ago, we took a look at a forum dedicated to Deepfake clips where the site was pushing Coinhive… Avzhan DDoS bot dropped by Chinese drive-by attack hasherezade February 23, 2018 0 Comments The Avzhan DDoS bot has been known since 2010, but recently we saw it in wild again, being dropped by a… Drive-by download campaign targets Chinese websites, experiments with exploits Jérôme Segura February 22, 2018 0 Comments During our web crawls we sometimes come across bizarre findings or patterns we haven’t seen before. This was the case with… How to build an incident response program: GDPR guidelines Paul Kincaid February 21, 2018 0 Comments In today’s computing world, it is not a matter of “if” an organization will get compromised, but “when.” That’s why, in… Previous 1 … 410 411 412 413 414 … 618 Next Contributors Threat Center Podcast Glossary Scams