Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
A competitor of the infamous Atomic Stealer targeting Mac users, has just launched a new campaign to lure in more victims.
Malwarebytes researchers have discovered a prolific campaign of fraudulent energy ads shown to users via Google searches.
Chinese speaking users looking for Telegram, or LINE are being targeted with malicious ads. Instead of downloading the legitimate application, they install malware.
Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware is stealthy thanks to added encryption and obfuscation of its code.
In recent malvertising campaigns, threat actors dropped the MetaStealer information stealer, more or less coinciding with a new version release.
A fake antivirus alert may suddenly hijack your screen while browsing. This latest malvertising campaign hit top publishers.
Compromised websites are being used to redirect to fake browser updates and deliver malware onto Mac users.
We've seen a particular card skimming campaign really pick up pace lately. With hundreds of stores compromised, you may come across it if you shop online this holiday season.
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally creating…