ALL POSTS Buggy implementation of CVE-2018-8373 vulnerability used to deliver Quasar RAT Jérôme Segura September 26, 2018 0 Comments A variant of a remote code execution vulnerability with Internet Explorer’s scripting engine known as CVE-2018-8373 patched last August has been found in… Safari users: Where did your extensions go? William Tsing September 25, 2018 0 Comments Safari 12 has brought with it some changes to how OSX handles browser extensions. At WWDC in June, Apple announced that… 100 channels and nothing on, except TV Licensing phishes Christopher Boyd September 25, 2018 0 Comments We’ve seen a lot of people referencing fake TV Licensing emails they’ve received over the last few days. The majority so… Mobile Menace Monday: SMS phishing attacks target the job market Nathan Collier September 24, 2018 0 Comments Recently, a co-worker received an enticing SMS message from ASPXPPZUPS Human Resources. It read: Tired of your old job? Join our team… A week in security (September 17 – 23) Malwarebytes Labs September 24, 2018 0 Comments Last week, we took a look at a low level spam campaign on Twitter, explored the signs of falling victim to… Simple Authentication and Security Layer (SASL) vulnerabilities Pieter Arntz September 21, 2018 0 Comments Simple Authentication and Security Layer (SASL) is an authentication layer used in Internet protocols. SASL is not a protocol, but rather… Emotet on the rise with heavy spam campaign Adam Kujawa September 21, 2018 0 Comments Correction, 5/22/19: Previously, we incorrectly stated that Emotet was using an EternalBlue vulnerability in order to spread laterally within a network. However,… Mass WordPress compromises redirect to tech support scams Jérôme Segura September 20, 2018 0 Comments Content Management Systems (CMSes) such as WordPress, Drupal, or Joomla are under a constant barrage of fire. Earlier this year, we… 6 sure signs someone is phishing you—besides email Kayla Matthews September 20, 2018 0 Comments There are several common and, unfortunately, frequently successful avenues of attack that cybercriminals can use to part you from your personal… Previous 1 … 388 389 390 391 392 … 617 Next Contributors Threat Center Podcast Glossary Scams