Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
A great number of attack techniques these days are using Microsoft Office documents to distribute malware. In recent years, there has...
[Edit 2019-01-24] Fallout EK introduces a new dropper to facilitate the final payload retrieval. This update replaces the plain MZ we...
We have been tracking a prolific malvertising campaign for several weeks and captured a variety of payloads, including several stealers. One...
One of the most interesting exploit kits we track is also a bit of an elusive one, and as such does...
For the past couple of years, Office documents have largely replaced exploit kits as the primary malware delivery vector, giving threat...
Umbro, the popular sportswear brand has had their Umbro Brasil website hacked and injected with not one but two web skimmers part...
Browlocks are the main driving force behind tech support scams, using a combination of malvertising and clever browser locker tricks to...
Tech support scammers are reusing an old technique in their existing browser locker (browlock) schemes to force a special kind of...
Exploit kit (EK) activity continues to surprise us as the weather cools, the leaves change, and we move into the fall of...
Contributors
Threat Center
Podcast
Glossary
Scams