Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Content Management Systems (CMSes) such as WordPress, Drupal, or Joomla are under a constant barrage of fire. Earlier this year, we…
There is a concerning trend lately in the Mac App Store. Several security researchers have independently found different apps that are…
Malware can be made of many components. Often, we encounter macros and scripts that work as malicious downloaders. Some functionalities can…
Traditionally, malware attacks as we have always known them are files written to disk in one form or another that require…
One of the Holy Grails for malware authors is a perfect way to impersonate a legitimate process. That would allow them…
The uptick trend in cybercriminals using exploit kits that we first noticed in our spring 2018 report has continued into the summer….
This blog post was authored by @hasherezade and Jérôme Segura. We recently detected a drive-by download attack trying to exploit CVE-2018-4878, a vulnerability in…
Last week, Kaspersky reported on a new variant of the Mac malware Proton, which they have dubbed Calisto, that has been…
This blog post was authored by @hasherezade and Jérôme Segura. The Magnitude exploit kit is one of the longest-serving browser exploitation…