Last week on Malwarebytes Labs, we looked at how secure the cloud is, understood why unexpected demand can influence an organization…

Last week on Malwarebytes Labs, we concluded our series on child identity theft. We also looked into threat actors and campaigns…

Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from the…

Last week on Malwarebytes Labs, we reported on a Ryuk ransomware attack on The Tampa Bay Times, a newspaper in Florida;…

Last week on Malwarebytes Labs, we reported on the presence of Magecart on a type of poker software; outlined how the…

Last week on Malwarebytes Labs, we explained how brain-machine interface (BMI) technology could usher in a world of Internet of Thoughts,…

Last week on the Malwarebytes Labs blog, we took a look at Modlishka, the latest hurdle in two-factor authentication (2FA), the…

Last week on Labs, we looked back at 2018 as the year of data breaches, homed in on pre-installed malware on…

Last week on Malwarebytes Labs, we found out that TrickBot became a top business threat, so we took a deeper look…

Last week, Malwarebytes welcomed National Cybersecurity Awareness Month by renewing our pledge to do what we do best: offer the best…