< Personal
Find the right product
Infected already?
< Business
Learn more about Security Advisor (available in every bundle). >
< Pricing
Protect your personal devices and data
Protect your team’s devices and data
Step up your corporate endpoint security. Save up to 45%
< Partners
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Stay up to date with the latest research and threat intelligence reports.
In a new malware campaign, threat actors are using Google ads to target Mac users looking to download Microsoft Teams.
A competitor of the infamous Atomic Stealer targeting Mac users, has just launched a new campaign to lure in more victims.
Detecting and disrupting a months-long malware campaign on an MSP.
Malwarebytes researchers have discovered a prolific campaign of fraudulent energy ads shown to users via Google searches.
Chinese speaking users looking for Telegram, or LINE are being targeted with malicious ads. Instead of downloading the legitimate application, they install malware.
Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware is stealthy thanks to added encryption and obfuscation of its code.
In recent malvertising campaigns, threat actors dropped the MetaStealer information stealer, more or less coinciding with a new version release.
A fake antivirus alert may suddenly hijack your screen while browsing. This latest malvertising campaign hit top publishers.
Compromised websites are being used to redirect to fake browser updates and deliver malware onto Mac users.
Contributors
Threat Center
Podcast
Glossary
Scams