Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account? Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
Researchers have discovered that Nobelium—the threat actor behind the infamous SolarWinds supply-chain attack, the Sunburst backdoor, TEARDROP malware, GoldMax malware, and...
If you’re running a service that relies on Apache Struts or uses the popular Apache Log4j utility we hope you haven’t...
Skimmers and other threat actors are backdooring websites, and WordPress instances in particular, according to a recently released report.Researchers at Sucuri...
An attempt at a simple definition: a search engine is a software system that allows users to find content on the...
Researchers at Positive Security have discovered a drive-by remote code-execution (RCE) bug in Windows 10. The vulnerability can be triggered by...
A mysterious threat actor has run thousands of malicious servers in entry, middle, and exit positions of the Tor network. Tracked...
Microsoft has taken control of 42 web domains that a hacking group was using to try to breach its targets.On December...
Emotet is one of the best known, and most dangerous, malware threats of the past several years.On several occasions it appeared...
As reported by Cryptolaemus on Twitter, and demonstrated step by step by BleepingComputer, Emotet is now being distributed through malicious Windows...
Contributors
Threat Center
Podcast
Glossary
Scams