Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
A tampered copy of FileZilla quietly contacts attacker-controlled servers using encrypted DNS traffic that can slip past traditional monitoring.
A fake purchase order attachment turned out to be a phishing page designed to harvest your login details.
A list of topics we covered in the week of February 23 to March 1 of 2026
Researchers found that Google API keys long treated as harmless can now unlock access to Gemini.
Disguised as a security check, this fake Google alert uses browser permissions to harvest contacts, location data, and more.
Attackers don’t always need custom malware. Sometimes they just need a trusted brand and a legitimate tool.
APT stands for Advanced Persistent Threat. But what does that actually mean, and how does it translate into the kind of threat you’re facing?
A third-party breach at Conduent now affects 25 million Americans—many never knew their data flowed through its systems.
Unsealed court records reveal Instagram executives discussed explicit messages to teens years before a blur feature was introduced.
Contributors
Threat Center
Podcast
Glossary
Scams