Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
We have identified a new drive-by download campaign that distributes the Princess ransomware (AKA PrincessLocker), leveraging compromised websites and the RIG…
As a follow up to our study into the Magnitude exploit kit and its gate (which we profiled in a previous…
Over the last few months, we have been keeping an eye on the Magnitude exploit kit which is mainly used to…
Last year, we reported on a new modular malware called TrickBot that uses a network protocol similar to Dyreza. The malware was…
Terror EK is an exploit kit made from a mishmash of stolen code and with very limited distribution. In the past few months,…
There is a growing trend among malware authors to incorporate legitimate applications in their malicious package. This time, we analyzed a…
Another week goes by and yet again we have another ransomware outbreak initially dropped by a malicious software update and eventually…
The latest wave of ransomware following the WannaCry outbreak has kept everyone very busy and been the topic of many conversations. In the meantime, other threat actors…
Since June 27th we have been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since day one,…