ALL POSTS Massive DDoS attack washes over GitHub Christopher Boyd March 2, 2018 0 Comments There’s been some huge DDoS (distributed denial of service) attacks over the years, but we’ve been…lucky?…enough to witness the latest raising of… Explained: SQL injection Pieter Arntz March 2, 2018 0 Comments Even though SQL injection is a type of attack that is relatively easy to prevent, it is one of the most… Blast from the past: stowaway Virut delivered with Chinese DDoS bot hasherezade March 1, 2018 0 Comments Recently, we described an unusual Chinese drive-by attack that was delivering a variant of the Avzhan DDoS bot. The attack also contained multiple… RIG malvertising campaign uses cryptocurrency theme as decoy Jérôme Segura February 28, 2018 0 Comments For a couple of weeks, we have been observing a malvertising campaign that uses decoy websites to redirect users to the… Encryption 101: ShiOne ransomware case study Vasilios Hioureas February 28, 2018 0 Comments In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used… Human Factor Podcast: Jenny Radcliffe and Chris Boyd Christopher Boyd February 27, 2018 0 Comments A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and… How to protect your computer from malicious cryptomining Pieter Arntz February 27, 2018 0 Comments Noticing that your computer is running slow? While sometimes a telltale sign of malware infection, these days that seems doubly true…. The state of malicious cryptomining Jérôme Segura February 26, 2018 0 Comments While cryptocurrencies have been around for a long time and used for legitimate purposes, online criminals have certainly tarnished their reputation…. A week in security (February 19 – February 25) Malwarebytes Labs February 26, 2018 0 Comments Last week on Malwarebytes Labs, we gave readers a primer on encryption, took a stab at that Deepfakes tool Internet users seem to… Previous 1 … 409 410 411 412 413 … 617 Next Contributors Threat Center Podcast Glossary Scams