ALL POSTS A week in security (July 03 – July 09) Malwarebytes Labs July 10, 2017 0 Comments Last week, we released our second quarter Cybercrime Tactics & Techniques report, where we revealed that ransomware outbreaks were dominant during… The key to old Petya versions has been published by the malware author Malwarebytes Labs July 6, 2017 0 Comments As research concluded, the original author of Petya, Janus, was not involved in the latest attacks on Ukraine. His original malware… Report: Second quarter dominated by ransomware outbreaks Malwarebytes Labs July 6, 2017 0 Comments The second quarter of 2017 brought ransomware to unprecedented levels with worldwide outbreaks that went almost out of control. In scenarios… All this EternalPetya stuff makes me WannaCry Adam McNeil July 6, 2017 0 Comments Another week goes by and yet again we have another ransomware outbreak initially dropped by a malicious software update and eventually… AdGholas malvertising thrives in the shadows of ransomware outbreaks Jérôme Segura July 5, 2017 0 Comments The latest wave of ransomware following the WannaCry outbreak has kept everyone very busy and been the topic of many conversations. In the meantime, other threat actors… A week in security (June 26 – July 02) Malwarebytes Labs July 3, 2017 0 Comments Last week, we offered our readers tips on how to detect phishing attempts, gave an overview of Google’s Be Internet Awesome… EternalPetya – yet another stolen piece in the package? Malwarebytes Labs June 30, 2017 0 Comments Since June 27th we have been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since day one,… EternalPetya and the lost Salsa20 key Malwarebytes Labs June 29, 2017 0 Comments We have recently been facing a huge outbreak of a new Petya-like malware armed with an infector similar to WannaCry. The research is… Solution Corner: Malwarebytes Endpoint Protection Ken Liao June 28, 2017 0 Comments Only one thing is certain in the threat landscape: the uncertainty around the attacks, the techniques, the tactics, and the vectors…. Previous 1 … 435 436 437 438 439 … 617 Next Contributors Threat Center Podcast Glossary Scams