ALL POSTS Phone spampocalypse: fighting back in the age of unwanted calls Jovi Umawing September 27, 2018 0 Comments When Nigel Guest, then president of the Council of Neighborhood Associations (CNA), sent an email with the subject line, “test,” and… Holes found in Mojave’s privacy protection Thomas Reed September 26, 2018 0 Comments macOS Mojave was released on Monday, September 24, with much promise of increased privacy protections. In particular, apps are now required… Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT Jérôme Segura September 26, 2018 0 Comments A variant of a remote code execution vulnerability with Internet Explorer’s scripting engine known as CVE-2018-8373 patched last August has been found in… Safari users: Where did your extensions go? William Tsing September 25, 2018 0 Comments Safari 12 has brought with it some changes to how OSX handles browser extensions. At WWDC in June, Apple announced that… 100 channels and nothing on, except TV Licensing phishes Christopher Boyd September 25, 2018 0 Comments We’ve seen a lot of people referencing fake TV Licensing emails they’ve received over the last few days. The majority so… Mobile Menace Monday: SMS phishing attacks target the job market Nathan Collier September 24, 2018 0 Comments Recently, a co-worker received an enticing SMS message from ASPXPPZUPS Human Resources. It read: Tired of your old job? Join our team… A week in security (September 17 – 23) Malwarebytes Labs September 24, 2018 0 Comments Last week, we took a look at a low level spam campaign on Twitter, explored the signs of falling victim to… Simple Authentication and Security Layer (SASL) vulnerabilities Pieter Arntz September 21, 2018 0 Comments Simple Authentication and Security Layer (SASL) is an authentication layer used in Internet protocols. SASL is not a protocol, but rather… Emotet on the rise with heavy spam campaign Adam Kujawa September 21, 2018 0 Comments Correction, 5/22/19: Previously, we incorrectly stated that Emotet was using an EternalBlue vulnerability in order to spread laterally within a network. However,… Previous 1 … 384 385 386 387 388 … 614 Next Contributors Threat Center Podcast Glossary Scams