ALL POSTS Back to school cybersecurity tips for parents and kids Jovi Umawing August 14, 2017 0 Comments The time to start the new school term is just around the corner. And for parents, the excitement and anxiety may… Cerber ransomware delivered in format of a different order of Magnitude Jérôme Segura August 9, 2017 0 Comments As a follow up to our study into the Magnitude exploit kit and its gate (which we profiled in a previous… Explained: security certificates Pieter Arntz August 8, 2017 0 Comments As a result of my PowerShell series [1],[2],[3], where I used the handling of certificates as an example, mainly because I… Apple phish: Summary report statement Christopher Boyd August 7, 2017 0 Comments If the following message lands in your mailbox, you may wish to throw on your “This is highly suspicious” cap before… A week in security (July 31 – August 6) Malwarebytes Labs August 7, 2017 0 Comments Last week we explored some basic PowerShell commands, dived into the new methods used by TrickBot, and wrote at length about… Learning PowerShell: basic programs Pieter Arntz August 4, 2017 0 Comments In the previous posts we have looked at some elementary PowerShell concepts and we have constructed some basic commands to export… DEFCON 25 Jérôme Boursier August 4, 2017 0 Comments After a few days in Las Vegas and after BlackHat, DEFCON 25 is finally over! It was an amazing time around… Enemy at the gates: Reviewing the Magnitude exploit kit redirection chain Jérôme Segura August 2, 2017 0 Comments Over the last few months, we have been keeping an eye on the Magnitude exploit kit which is mainly used to… Black Hat USA 2017 Recap Malwarebytes Labs August 2, 2017 0 Comments What do you get when you put hackers, gambling, and dogs together? Black Hat USA 2017 …and a random zoo conference happening… Previous 1 … 432 433 434 435 436 … 618 Next Contributors Threat Center Podcast Glossary Scams