ALL POSTS Click “OK” to defeat MFA Pieter Arntz December 10, 2021 0 Comments Researchers have discovered that Nobelium—the threat actor behind the infamous SolarWinds supply-chain attack, the Sunburst backdoor, TEARDROP malware, GoldMax malware, and… What is a search engine and why does anyone care which one you use? Pieter Arntz December 9, 2021 0 Comments An attempt at a simple definition: a search engine is a software system that allows users to find content on the… Has your WordPress site been backdoored by a skimmer? Pieter Arntz December 9, 2021 0 Comments Skimmers and other threat actors are backdooring websites, and WordPress instances in particular, according to a recently released report.Researchers at Sucuri… Fake job interviews plague major game developers like Riot Games and Rockstar Christopher Boyd December 9, 2021 0 Comments If you’re job hunting at the moment, be on your guard. The pandemic is still around. Lots of people are in… Was threat actor KAX17 de-anonymizing the Tor network? Pieter Arntz December 8, 2021 0 Comments A mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network. Tracked… Vulnerability in Windows 10 URI handler leads to remote code execution Pieter Arntz December 8, 2021 0 Comments Researchers at Positive Security have discovered a drive-by remote code-execution (RCE) bug in Windows 10. The vulnerability can be triggered by… Microsoft disrupts China-based hacking group Nickel Pieter Arntz December 7, 2021 0 Comments Microsoft has taken control of 42 web domains that a hacking group was using to try to breach its targets.On December… Is your web browser vulnerable to data theft? XS-Leak explained Malwarebytes Labs December 7, 2021 0 Comments In recent news, IT security researchers from Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences have disclosed 14 new… How to check for Windows updates and install them Malwarebytes Labs December 7, 2021 0 Comments Keeping Windows up to date is an important part of warding off malware, exploits, and other attacks. If you’re not running… Previous 1 … 263 264 265 266 267 … 619 Next Contributors Threat Center Podcast Glossary Scams