Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
The DEAD#VAX campaign tricks users into installing AsyncRAT by disguising a virtual hard disk as a PDF attachment.
We followed a fake cloud storage payment alert through deceptive affiliate redirects, ending at a familiar destination: Freecash.
Fake party invitations are used to install remote access tools, so the criminals are the ones invited.
This Moltbot impersonation campaign is a case study in supply-chain risk, brand hijacking, and what happens when open source goes viral.
Recently, we uncovered a realistic, multi-layered data theft phishing campaign targeting AT&T customers.
An attempt to drop two RATs on a system used an uncanny assortment of legitimate Windows tools.
Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example.
We unpack a trojanized WinRAR download that was hiding the Winzipper malware behind a real installer.
A “purchase order” PDF blocked by Malwarebytes led to a credential-harvesting phishing site. So we analyzed the attack and where the data went next.