Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
It is well known that hot commodities tend to attract scammers and online criminals. The continuous rise of Bitcoin over the…
We have identified a new drive-by download campaign that distributes the Princess ransomware (AKA PrincessLocker), leveraging compromised websites and the RIG…
Over the last few months, we have been keeping an eye on the Magnitude exploit kit which is mainly used to…
Terror EK is an exploit kit made from a mishmash of stolen code and with very limited distribution. In the past few months,…
The latest wave of ransomware following the WannaCry outbreak has kept everyone very busy and been the topic of many conversations. In the meantime, other threat…
Given the recent renewed attention about ‘RoughTed’ and Kafeine‘s tweet, we wanted to clarify that RoughTed and associated domains are in fact part…
One of the most common malware campaigns from compromised websites is known as EITest and has traditionally been redirecting victims towards…
Since our last post on Terror EK, we haven’t really seen much activity from this exploit kit. However, in recent days…
When looking at malicious traffic, one of the things we are interested in are the hosts involved in a particular attack. For…