ALL POSTS Watch out for Costly Mobile Ads Christopher Boyd August 11, 2015 0 Comments There are lots of ways you can have a bad hair day with a mobile device – a rogue app from… Recent Internet Explorer Vulnerability Exploited in The Wild Jérôme Segura August 11, 2015 0 Comments A recently patched Internet Explorer vulnerability (CVE-2015-2419) has already made its way into the top exploit kit on the market, Angler… Automatic Analysis Using Malheur And Cuckoo Joshua Cannell August 11, 2015 0 Comments Oftentimes when performing automated analysis of malware we seek to answer one basic question: what kind of malware is it?Automated analysis… A Week in Security (Aug 02 – Aug 08) Malwarebytes Labs August 11, 2015 0 Comments Last week, we saw a fake Android alert that blames Chinese hackers, a peculiar Facebook phishing campaign that is after your… Mobile Device Security Tips and Tricks Malwarebytes Labs August 10, 2015 0 Comments Desktops and laptops have long been major targets for viruses and other cyber attacks, but with the exponential growth and availability… New Firefox Zero-Day: Patch Now! (UPDATED) Jérôme Segura August 9, 2015 0 Comments Update (08/11): Mac users are now being targeted by a newer version of this exploit.Original Post:Mozilla released a critical security advisory late… Rainbows, Steganography and Malware in a new .NET cryptor hasherezade August 7, 2015 0 Comments This post describes the process of unpacking a malicious payload delivered in a new spam campaign.I often observe malicious samples, distributed in… “Payment Confirmation Slip” Spam Offers Up Malware Christopher Boyd August 6, 2015 0 Comments Update: We now have an in-depth analysis of this Malware on the blog.There’s a piece of email spam currently in circulation, offering… Chinese Actors Copy and Paste HackingTeam Zero-Days in Site Hack Jérôme Segura August 6, 2015 0 Comments The HackingTeam data leak was a treasure trove for threat actors. As we documented on this blog, it didn’t take long… Previous 1 … 515 516 517 518 519 … 617 Next Contributors Threat Center Podcast Glossary Scams