ALL POSTS Why do I care about someone else’s data breach? William Tsing February 1, 2017 0 Comments Because as the size of your organization increases, the probability that an individual employee’s company email is in that breach rises… Locky Bart ransomware and backend server analysis Malwarebytes Labs January 31, 2017 0 Comments In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware… A look back at the Zyns iframer campaign Jérôme Segura January 31, 2017 0 Comments We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to… How do I get my employees to stop clicking on everything? William Tsing January 30, 2017 0 Comments If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has… Zbot with legitimate applications on board Malwarebytes Labs January 26, 2017 0 Comments Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with… VirLocker’s comeback; including recovery instructions Nathan Scott January 25, 2017 0 Comments VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now…. Avoid these “Free Minecraft / Garry’s Mod” adverts Christopher Boyd January 25, 2017 0 Comments Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies… Understanding the basics of two-factor authentication Pieter Arntz January 20, 2017 0 Comments Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of… Verified Twitter accounts compromised, get busy spamming Christopher Boyd January 19, 2017 0 Comments Update: Twitter only recommends that verified users enable 2FA on their accounts. They do, however, need to have a verified phone… Previous 1 … 454 455 456 457 458 … 620 Next Contributors Threat Center Podcast Glossary Scams