ALL POSTS Process Doppelgänging meets Process Hollowing in Osiris dropper hasherezade August 13, 2018 0 Comments One of the Holy Grails for malware authors is a perfect way to impersonate a legitimate process. That would allow them… A week in security (August 6 – August 12) Malwarebytes Labs August 13, 2018 0 Comments Last week, we published a review of exploit kits, talked about everyday tech that can give you a headache, and showed… 8 everyday technologies that can make you vulnerable to cyberattacks Kayla Matthews August 9, 2018 0 Comments The technological advances of the modern world make for an exciting and convenient lifestyle. With each new development, from artificial intelligence… White hat, black hat, and the emergence of the gray hat: the true costs of cybercrime Malwarebytes Labs August 8, 2018 0 Comments This post was written by Michael Osterman of Osterman Research.Osterman Research recently completed a major survey on behalf of Malwarebytes to… Exploit kits: summer 2018 review Jérôme Segura August 7, 2018 0 Comments The uptick trend in cybercriminals using exploit kits that we first noticed in our spring 2018 report has continued into the summer…. A week in security (July 30 – August 5) Malwarebytes Labs August 6, 2018 0 Comments Last week, we posted a roundup of spam that may have landed in your mailbox, talked about what makes us susceptible… Explained: What is big data? Pieter Arntz August 3, 2018 0 Comments If the pile of manure is big enough, you will find a gold coin in it eventually. This saying is used… Social engineering attacks: What makes you susceptible? Jovi Umawing August 2, 2018 0 Comments We now live in a world where holding the door open for someone balancing a tray of steaming hot coffee—she can’t… What’s in the spam mailbox this week? Christopher Boyd July 31, 2018 0 Comments We’ve seen a fair few spam emails in circulation this week, ranging from phishing to money muling to sexploitation. Shall we… Previous 1 … 392 393 394 395 396 … 617 Next Contributors Threat Center Podcast Glossary Scams