ALL POSTS Malware in a Jar Joshua Cannell April 3, 2013 0 Comments As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery. This… Malwarebytes Hit by Targeted Attack! Adam Kujawa April 1, 2013 0 Comments Dear Readers, We regret to inform you that over the weekend, Malwarebytes was under direct, targeted attack from a new type… Who is ‘Whois’ ? Joshua Cannell March 26, 2013 0 Comments On March 20th, reports were circulating that a cyberattack had been conducted against broadcast networks and banks in South Korea. In… Hoaxes Pieter Arntz March 25, 2013 0 Comments A hoax ( to trick into believing or accepting as genuine something false and often preposterous ) is the word we… Internet everywhere and poor security practices: a disaster in the making? Jérôme Segura March 22, 2013 0 Comments We often hear about botnets (networks of infected computers) being used to send out spam, perform Distributed Denial of Service attacks… From Russia with Ransomware Joshua Cannell March 20, 2013 0 Comments This week the research team stumbled across a Russian ransomware sample so I decided to take a peek. The ransom message… Malwarebytes Anti-Rootkit – Raising the Bar! Marcus Chung March 18, 2013 0 Comments For all our interested readers, both Marcin, our CEO and I (Marcus) were recently interviewed for an article to discuss our… New Exploit Kit, Ransomware and AV evasion Jérôme Segura March 14, 2013 0 Comments Ransomware is still going strong and infecting countless PCs. We happened to stumble upon an interesting sample part of the Urausy… High Exposure Jérôme Segura March 14, 2013 0 Comments Bill Gates is the latest victim of a series of hacks targeting celebrities and getting their private information exposed to the… Previous 1 … 582 583 584 585 586 … 592 Next Contributors Threat Center Podcast Glossary Scams