ALL POSTS How to secure your content management system Pieter Arntz August 16, 2018 0 Comments Suppose you want to start your own blog or set up a website where you can easily manage its content, the… Under the hoodie: why money, power, and ego drive hackers to cybercrime Wendy Zamora August 15, 2018 0 Comments Just one more hour behind the hot grill flipping burgers, and Derek* could call it a day. Under his musty hat,… Black Hat USA 2018: ransomware is still the star Malwarebytes Labs August 15, 2018 0 Comments The Malwarebytes team was at the annual Black Hat USA event held in Las Vegas at the Mandalay Bay Hotel from… Back to school cybersecurity: hints, tips, and links for a safer school year Malwarebytes Labs August 14, 2018 0 Comments It’s that time of year again when parents are slowly gearing up for a new school term. Some schools have a… Process Doppelgänging meets Process Hollowing in Osiris dropper hasherezade August 13, 2018 0 Comments One of the Holy Grails for malware authors is a perfect way to impersonate a legitimate process. That would allow them… A week in security (August 6 – August 12) Malwarebytes Labs August 13, 2018 0 Comments Last week, we published a review of exploit kits, talked about everyday tech that can give you a headache, and showed… 8 everyday technologies that can make you vulnerable to cyberattacks Kayla Matthews August 9, 2018 0 Comments The technological advances of the modern world make for an exciting and convenient lifestyle. With each new development, from artificial intelligence… White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime Malwarebytes Labs August 8, 2018 0 Comments This post was written by Michael Osterman of Osterman Research.Osterman Research recently completed a major survey on behalf of Malwarebytes to… Exploit kits: summer 2018 review Jérôme Segura August 7, 2018 0 Comments The uptick trend in cybercriminals using exploit kits that we first noticed in our spring 2018 report has continued into the summer…. Previous 1 … 391 392 393 394 395 … 616 Next Contributors Threat Center Podcast Glossary Scams