ALL POSTS Google reminds website owners to move to HTTPS before October deadline Jovi Umawing September 7, 2017 0 Comments With the release of Chrome v62 in less than 3 months, Google will begin marking non-HTTPS pages with text input fields—like… Explained: False positives Pieter Arntz September 7, 2017 0 Comments What are false positives?False positive, which is sometimes written as f/p, is an expression commonly used in cybersecurity to denote that… Nigerian scams without the Nigerians William Tsing September 6, 2017 0 Comments Users in English speaking countries are quite familiar with the Nigerian scam: an important guy in Nigeria needs your help getting… Facebook worries: I didn’t post that Pieter Arntz September 6, 2017 0 Comments It is my assumption that most Facebook users don’t look at their own profile often. With your own profile, I mean… Expired domain names and malvertising Jérôme Segura September 5, 2017 0 Comments In Q1 and Q2 of 2017, we noticed a sharp decline in drive-by downloads coming from compromised websites. The campaigns of… A week in security (August 28 – September 3) Malwarebytes Labs September 4, 2017 0 Comments Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived… Insider threats in your work inbox Jovi Umawing September 1, 2017 0 Comments Recently, our friends at Barracuda found a new phishing campaign that banks on the popularity of cloud services used in most businesses, such as Microsoft Office 365.According to their… RIG exploit kit distributes Princess ransomware Jérôme Segura August 31, 2017 0 Comments We have identified a new drive-by download campaign that distributes the Princess ransomware (AKA PrincessLocker), leveraging compromised websites and the RIG… Locky ransomware adds anti sandbox feature (updated) Malwarebytes Labs August 31, 2017 0 Comments By Marcelo Rivero and Jérôme SeguraThe Locky ransomware has been very active since its return which we documented in a previous… Previous 1 … 425 426 427 428 429 … 614 Next Contributors Threat Center Podcast Glossary Scams