Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
This Moltbot impersonation campaign is a case study in supply-chain risk, brand hijacking, and what happens when open source goes viral.
Recently, we uncovered a realistic, multi-layered data theft phishing campaign targeting AT&T customers.
An attempt to drop two RATs on a system used an uncanny assortment of legitimate Windows tools.
Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example.
We unpack a trojanized WinRAR download that was hiding the Winzipper malware behind a real installer.
A “purchase order” PDF blocked by Malwarebytes led to a credential-harvesting phishing site. So we analyzed the attack and where the data went next.
Malwarebytes threat research reveals spike in adware and malicious malware families Triada and MobiDash heading into the holiday season.
We’ve seen a new wave of attacks exploiting legitimate Remote Monitoring and Management (RMM) tools to remotely control victims’ systems.
In 2025, receiving a .vbs “invoice” is like finding a floppy disk in your mailbox. It's retro, suspicious, and definitely not something you should run.