Last week, we took a look at a low level spam campaign on Twitter, explored the signs of falling victim to…
Tag: vulnerability
Regular expression, or “regex” for short, is a mathematical term for the theory used to describe regular languages. But in computing, regexes…
Virtual personal assistants (VPA), also known as smart assistants like Amazon’s Alexa and Google’s Assistant, are in the spotlight for vulnerabilities to…
Last week on Labs, we looked at the case of a fake Android AV, an annoying adware that goes by the…
We recently updated our redirections rule in HTTPS-Everywhere, a browser extension that automatically redirects you to the HTTPS version of the…
This is an overview of the most popular exploit kits that we have caught in our honeypots in the past few weeks and have…
For the last four years, ransomware has evolved into one of the biggest threats to cyber security that I’ve seen in…
Much has been said in the security world about the recent release of data on vulnerabilities discovered in 2015. Due to the…
By Benny CzarnyOne of the main reasons to have a NAC (Network Access Control) system in place is to keep risky devices…
We just released a new version of our Malwarebytes Anti-Exploit software which is packed with new and advanced exploit detection and blocking…