ALL POSTS Inside a purchase order PDF phishing campaign Pieter Arntz December 17, 2025 0 Comments A “purchase order” PDF blocked by Malwarebytes led to a credential-harvesting phishing site. So we analyzed the attack and where the data went next. SoundCloud, Pornhub, and 700Credit all reported data breaches, but the similarities end there Pieter Arntz December 16, 2025 0 Comments We compared three incidents that surfaced today to show why the impact of a breach depends less on who was hit and more on what was taken. Android mobile adware surges in second half of 2025 Pieter Arntz December 16, 2025 0 Comments Malwarebytes threat research reveals spike in adware and malicious malware families Triada and MobiDash heading into the holiday season. Photo booth flaw exposes people’s private pictures online Danny Bradbury December 16, 2025 0 Comments A security researcher says a basic website flaw at a photo booth operator may have exposed hundreds of private customer photos. Google is discontinuing its dark web report: why it matters Pieter Arntz December 16, 2025 0 Comments Google will discontinue its dark web report early next year, prompting mixed reactions. How does dark web monitoring actually help keep you safe? Pig butchering is the next “humanitarian global crisis” (Lock and Code S06E25) Malwarebytes Labs December 15, 2025 0 Comments This week on the Lock and Code podcast, we speak with Erin West about pig butchering scams and the efforts to stop this new, global crisis. PayPal closes loophole that let scammers send real emails with fake purchase notices Pieter Arntz December 15, 2025 0 Comments Scammers exploited a PayPal subscriptions feature to send legitimate emails from service@paypal.com, using fake purchase notifications to push tech support scams. A week in security (December 8 – December 14) Malwarebytes Labs December 15, 2025 0 Comments A list of topics we covered in the week of December 8 to December 14 of 2025 The US digital doxxing of H-1B applicants is a massive privacy misstep Mark Beare December 12, 2025 0 Comments By making social accounts public, the new policy exposes private data that attackers can use for targeting, impersonation, or extortion. Previous 1 … 24 25 26 27 28 … 618 Next Contributors Threat Center Podcast Glossary Scams