ALL POSTS Exploit kits: summer 2018 review Jérôme Segura August 7, 2018 0 Comments The uptick trend in cybercriminals using exploit kits that we first noticed in our spring 2018 report has continued into the summer…. A week in security (July 30 – August 5) Malwarebytes Labs August 6, 2018 0 Comments Last week, we posted a roundup of spam that may have landed in your mailbox, talked about what makes us susceptible… Explained: What is big data? Pieter Arntz August 3, 2018 0 Comments If the pile of manure is big enough, you will find a gold coin in it eventually. This saying is used… Social engineering attacks: What makes you susceptible? Jovi Umawing August 2, 2018 0 Comments We now live in a world where holding the door open for someone balancing a tray of steaming hot coffee—she can’t… What’s in the spam mailbox this week? Christopher Boyd July 31, 2018 0 Comments We’ve seen a fair few spam emails in circulation this week, ranging from phishing to money muling to sexploitation. Shall we… A week in security (July 23 – July 29) Malwarebytes Labs July 30, 2018 0 Comments Last week on Labs, we looked at an adware called MobiDash getting stealthy, a new strain of Mac malware called Proton that was found… New Android P includes several security improvements Gleb Malygin July 27, 2018 0 Comments According to the Android developer Program Overview, the next major version of Android, Android 9.0 or P, is set to arrive soon…. Introducing: Malwarebytes Browser Extension Malwarebytes Labs July 26, 2018 0 Comments [Update 9/20/2019] The browser extensions are out of beta. You can read about the final product Malwarebytes Browser Guard in this… ‘Hidden Bee’ miner delivered via improved drive-by download toolkit Malwarebytes Labs July 26, 2018 0 Comments This blog post was authored by @hasherezade and Jérôme Segura.We recently detected a drive-by download attack trying to exploit CVE-2018-4878, a vulnerability in Flash… Previous 1 … 389 390 391 392 393 … 614 Next Contributors Threat Center Podcast Glossary Scams