ALL POSTS We block shady ad blockers Malwarebytes Labs July 11, 2018 0 Comments Some of you have reached out to us concerning Malwarebytes blocking of certain ad blocking extensions, or an influx in web… IoT domestic abuse: What can we do to stop it? Christopher Boyd July 11, 2018 0 Comments Some 40 years ago, the sci-fi/horror film Demon Seed told the tale of a woman slowly imprisoned by a sentient AI,… So you’ve been asked to start a threat intel program William Tsing July 10, 2018 0 Comments Ever since the Mandiant APT1 report landed like a bomb in private sector security reporting, threat intelligence has been a hot… Everybody and their mother is blocking ads, so why aren’t you? Adam McNeil July 9, 2018 0 Comments This post may ruffle a few feathers. But we’re not here to offer advice to publishers on how to best generate revenue… A week in security (July 2 – July 8) Malwarebytes Labs July 9, 2018 0 Comments Last week, we tracked back a large mining operation from their Coinhive shortlink, we took a look at online project management… Can we trust our online project management tools? Pieter Arntz July 6, 2018 0 Comments How would you feel about sharing confidential information about your company on Twitter or Facebook? That doesn’t sound right, does it?… Obfuscated Coinhive shortlink reveals larger mining operation Jérôme Segura July 3, 2018 0 Comments During the past several months, in-browser mining has continued to affect a large number of websites, predominantly relying on Coinhive’s infamous… New macro-less technique to distribute malware Jérôme Segura July 2, 2018 0 Comments One of the most common and effective infection vectors, especially for businesses, is the use of malicious Office documents. This year… Mac malware targets cryptomining users Thomas Reed July 2, 2018 0 Comments Last week, a security researcher named Remco Verhoef announced the discovery of a new piece of Mac malware being distributed on… Previous 1 … 392 393 394 395 396 … 614 Next Contributors Threat Center Podcast Glossary Scams