ALL POSTS PCVARK plays dirty Thomas Reed August 19, 2016 0 Comments Recently, Jérôme Segura forwarded me a link to a fake virus scam page that seemed to be Mac-related. I began to… Shakti Trojan: Technical Analysis Malwarebytes Labs August 17, 2016 0 Comments Recently, we took a look at the interesting Trojan found by Bleeping Computer. Our small investigation on its background and possible… Parents, beware of this SMS scam Jovi Umawing August 17, 2016 0 Comments We’ve recently been alerted to a scam circulating within the UK and causing distress to parents or adults who knows someone… Soldiering on: the $5.6 million 419 scam Christopher Boyd August 16, 2016 0 Comments 419 scams most commonly drop into your mailbox, but they do occasionally appear via other channels such as snail mail and… Exploit kit shakedown: RIG EK grabs Neutrino EK campaigns Jérôme Segura August 16, 2016 0 Comments Exploit kits are going through some strange phases these days. Two major malware distribution campaigns, namely Pseudo Darkleech and EITTest traditionally… Shakti Trojan: Document Thief Malwarebytes Labs August 15, 2016 0 Comments While some ransomware (i.e. Chimera) give bogus threats about stealing and releasing private files, there are other malware families that in fact… A week in security (Aug 07 – Aug 13) Malwarebytes Labs August 15, 2016 0 Comments Last week, we revealed a new Facebook celebrity death hoax, shed light on the case of a fake NatWest Bank Twitter… Venus Locker another .NET ransomware Malwarebytes Labs August 12, 2016 0 Comments The current cyberthreat landscape is an ever dynamic threat, we have state-sponsored cyberthreats and very sophisticated cybercriminals to defend against. These… Neutrino EK: more Flash trickery Jérôme Segura August 12, 2016 0 Comments A while back we wrote about the Neutrino exploit kit performing fingerprinting checks to weed out security researchers and honeypots attempting to catch… Previous 1 … 468 469 470 471 472 … 618 Next Contributors Threat Center Podcast Glossary Scams