Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Last week, we took a look at the theories behind preventing users from clicking everything (don’t worry, you’re allowed to click that),...
For anyone that travels, uses their phone in public, or stays constantly connected to the internet anywhere they go—which probably means...
In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware...
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with...
This malware came in a phishing e-mail – disguised as a Bitcoin wallet. After clicking the link, user receives a JAR...
Last week, we talked about what Windows environmental variables are, more phishy sponsored tweets in the wild, and—if you haven’t actually...
This post was co-authored by @hasherezade and Jérôme SeguraDuring the Christmas season and early into the new year, we noticed a sharp decrease in...
Last week, we pushed out an in-depth analysis of a Sundown exploit kit campaign dropping a miner for the cryptocurrency, Monero....
This post was authored by @hasherezade and Jérôme SeguraWe recently encountered an atypical case of Sundown EK in the wild – usually the landing page...
Contributors
Threat Center
Podcast
Glossary
Scams