Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
An attempt to drop two RATs on a system used an uncanny assortment of legitimate Windows tools.
Attackers use legitimate open-source software as cover, relying on user trust to compromise systems. We dive into an example.
We unpack a trojanized WinRAR download that was hiding the Winzipper malware behind a real installer.
A “purchase order” PDF blocked by Malwarebytes led to a credential-harvesting phishing site. So we analyzed the attack and where the data went next.
Malwarebytes threat research reveals spike in adware and malicious malware families Triada and MobiDash heading into the holiday season.
We’ve seen a new wave of attacks exploiting legitimate Remote Monitoring and Management (RMM) tools to remotely control victims’ systems.
In 2025, receiving a .vbs “invoice” is like finding a floppy disk in your mailbox. It's retro, suspicious, and definitely not something you should run.
Even a sloppy, low-skill phish can wreck your day. We go under the hood of this basic credential-harvesting campaign.
Boo! A Home Depot Halloween “giveaway” isn’t a treat—it’s a phishing trick. Fake links, tracking pixels, and compromised sites are the real prizes.