ALL POSTS No man’s land: How a Magecart group is running a web skimming operation from a war zone Threat Intelligence Team July 18, 2019 0 Comments Our Threat Intelligence team has been monitoring the activities of a number of threat actors involved in the theft of credit… Compromising vital infrastructure: problems in education security continue Pieter Arntz July 17, 2019 0 Comments The educational system and many of its elements are targets for cybercriminals on a regular basis. While education is a fundamental… Hi, honey. It’s mom. My phone is acting funny again. Kacy Zurkus July 16, 2019 0 Comments Whether it’s setting up access to a Netflix account on a smart TV or enabling personal email on an iPhone, some… Meet Extenbro, a new DNS-changer Trojan protecting adware Pieter Arntz July 15, 2019 0 Comments Recently, we uncovered a new DNS-changer called Extenbro that comes with an adware bundler. These DNS-changers block access to security-related sites,… A week in security (July 8 – 14) Malwarebytes Labs July 15, 2019 0 Comments Last week on Malwarebytes Labs, we looked at ways to send your sensitive information in a secure fashion, examined some tactics… Cellular networks under fire from Soft Cell attacks Christopher Boyd July 12, 2019 0 Comments We place a lot of trust in our mobile experience, given they’re one of the most constant companions we have. Huge… Caution: Misuse of security tools can turn against you Vasilios Hioureas July 11, 2019 0 Comments We have a saying in Greece: “They assigned the wolf to watch over the sheep.”In a security context, this is a… What should a US federal data privacy law ideally include? David Ruiz July 10, 2019 0 Comments In the constant David-and-Goliath struggle between digital privacy advocates and corporate privacy invaders, the question of how to legally protect Americans… Enterprise incident response: getting ahead of the wave William Tsing July 10, 2019 0 Comments Enterprise defenders have a tough job. In contrast to small businesses, large enterprise can have thousands of endpoints, legacy hardware from… Previous 1 … 360 361 362 363 364 … 618 Next Contributors Threat Center Podcast Glossary Scams