ALL POSTS 2017 State of Malware Report Jérôme Segura February 3, 2017 0 Comments 2016 was the year that reminded us how important prevention is, no matter what type of user you may be. Indeed… Why do I care about someone else’s data breach? William Tsing February 1, 2017 0 Comments Because as the size of your organization increases, the probability that an individual employee’s company email is in that breach rises… Locky Bart ransomware and backend server analysis Malwarebytes Labs January 31, 2017 0 Comments In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware… A look back at the Zyns iframer campaign Jérôme Segura January 31, 2017 0 Comments We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to… How do I get my employees to stop clicking on everything? William Tsing January 30, 2017 0 Comments If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has… Zbot with legitimate applications on board Malwarebytes Labs January 26, 2017 0 Comments Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with… VirLocker’s comeback; including recovery instructions Nathan Scott January 25, 2017 0 Comments VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now…. Avoid these “Free Minecraft / Garry’s Mod” adverts Christopher Boyd January 25, 2017 0 Comments Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies… Understanding the basics of two-factor authentication Pieter Arntz January 20, 2017 0 Comments Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of… Previous 1 … 448 449 450 451 452 … 614 Next Contributors Threat Center Podcast Glossary Scams