Last week, we took a look at a malware-campaign called FakeUpdates, methods to use secure instant messaging, the inner workings of…
Tag: encryption
A week in security (March 26 – April 01)
Last week, we looked at the thought process behind creating a ransomware decryptor, the inner workings of QuantLoader, the ways one…
Encryption 101: Decryptor’s thought process
In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live…
A week in security (March 05 – March 11)
Last week on Malwarebytes Labs, we paid homage to several women in tech, including some of our very own, on International…
Encryption 101: ShiOne ransomware case study
In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used…
Encryption 101: a malware analyst’s primer
While most in the security industry know what encryption is, many lack a basic understanding of how it is used in malware—especially ransomware….
Your ISP, browsing history, and what to do about it
In late March, Congress approved a bill lifting restrictions imposed on ISPs last year concerning what they could do with information…
Explained: Sage ransomware
Sage is yet another ransomware that has become a common threat nowadays. Similarly to Spora, it has capabilities to encrypt files…
Snapdragon Tightens Mobile Security
Being able to access sensitive data anytime and anywhere is convenient but potentially dangerous. Most of us walk around with sensitive…
4 Things to Consider When Assessing Device Posture for Effective Network Access Control
By Benny Czarny One of the main reasons to have a NAC (Network Access Control) system in place is to keep risky…