ALL POSTS Magecart Group 4: A link with Cobalt Group? Threat Intelligence Team October 3, 2019 0 Comments Note: This blog post is a collaboration between the Malwarebytes and HYAS Threat Intelligence teams.Magecart is a term that has become… How security orchestration improves detection and response Pieter Arntz October 2, 2019 0 Comments Working together in perfect harmony like the wind and percussion sections of a symphony orchestra requires both rigorous practice and a… For Cybersecurity and Domestic Violence Awareness months, we pledge to fight stalkerware Wendy Zamora October 1, 2019 0 Comments Starting today, two hallmark holidays are upon us. No, it’s not Halloween and Thanksgiving. It’s both Cybersecurity Awareness Month and Domestic… A week in security (September 23 – 29) Malwarebytes Labs September 30, 2019 0 Comments Last week on Labs, we highlighted an Emotet campaign using Snowden’s new book as a lure, discussed how 15,000 webcams are… New iOS exploit checkm8 allows permanent compromise of iPhones Thomas Reed September 27, 2019 0 Comments UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the… Insurance data security laws skirt political turmoil David Ruiz September 25, 2019 0 Comments Across the United States, a unique approach to lawmaking has proved radically successful in making data security stronger for one industry—insurance… 15,000 webcams vulnerable to attack: how to protect against webcam hacking Christopher Boyd September 24, 2019 0 Comments Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam… A week in security (September 16 -22) Malwarebytes Labs September 23, 2019 0 Comments Last week on Labs, we sounded the alarm about the relaunch of Emotet, one of the year’s most dangerous forms of… What role does data destruction play in cybersecurity? Kayla Matthews September 20, 2019 0 Comments When organization leaders think about cybersecurity, it’s usually about which tools and practices they need to add to their stack—email protection,… Previous 1 … 352 353 354 355 356 … 617 Next Contributors Threat Center Podcast Glossary Scams