ALL POSTS Building an incident response program: creating the framework Paul Kincaid March 7, 2018 0 Comments In part one of our series, our overview of Building an incident response plan, we discussed what regulations organizations will need… Week in security (February 26 – March 4) Malwarebytes Labs March 5, 2018 0 Comments Last week on Malwarebytes Labs, we explained how to protect your computer from malicious cryptomining, we gave an encryption 101 lesson using… Mobile Menace Monday: Olympics app has more ads than games Nathan Collier March 5, 2018 0 Comments An app claiming to live stream the 2018 Winter Olympics (but really serving up a blizzard of ads) had a short… Massive DDoS attack washes over GitHub Christopher Boyd March 2, 2018 0 Comments There’s been some huge DDoS (distributed denial of service) attacks over the years, but we’ve been…lucky?…enough to witness the latest raising of… Explained: SQL injection Pieter Arntz March 2, 2018 0 Comments Even though SQL injection is a type of attack that is relatively easy to prevent, it is one of the most… Blast from the past: stowaway Virut delivered with Chinese DDoS bot hasherezade March 1, 2018 0 Comments Recently, we described an unusual Chinese drive-by attack that was delivering a variant of the Avzhan DDoS bot. The attack also contained multiple… RIG malvertising campaign uses cryptocurrency theme as decoy Jérôme Segura February 28, 2018 0 Comments For a couple of weeks, we have been observing a malvertising campaign that uses decoy websites to redirect users to the… Encryption 101: ShiOne ransomware case study Vasilios Hioureas February 28, 2018 0 Comments In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used… Human Factor Podcast: Jenny Radcliffe and Chris Boyd Christopher Boyd February 27, 2018 0 Comments A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and… Previous 1 … 409 410 411 412 413 … 617 Next Contributors Threat Center Podcast Glossary Scams