Category: MalwareBytes

One year later, Rhadamanthys is still dropped via malvertising
28
Feb
2024

One year later, Rhadamanthys is still dropped via malvertising

It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious…

Change Healthcare logo
28
Feb
2024

Change Healthcare outages reportedly caused by ransomware

On Wednesday February 21, 2024, Change Healthcare—a subsidiary of UnitedHealth Group—experienced serious system outages due to a cyberattack. In a…

A Trojan Horse on wheels breaks into the screen of a smartphone
27
Feb
2024

Android banking trojans: How they steal passwords and drain bank accounts

For the most popular operating system in the world—which is Android and it isn’t even a contest—there’s a sneaky cyberthreat…

A couple wearing a chicken and a fox mask.
27
Feb
2024

Identity theft is number one threat for consumers, says report

The German Federal Office for Information Security (BSI) has published a report on The State of IT Security in Germany…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
26
Feb
2024

How to make a fake ID online, with Joseph Cox: Lock and Code S05E05

This week on the Lock and Code podcast… For decades, fake IDs had roughly three purposes: Buying booze before legally…

week in security
26
Feb
2024

A week in security (February 19 – February 25)

Cybersecurity info you can’t live without Want to stay informed on the latest news in cybersecurity? Sign up for our…

Joomla logo
23
Feb
2024

Joomla! patches XSS flaws that could lead to remote code execution

On February 20, Joomla! posted details about four vulnerabilities it had fixed in its Content Management System (CMS), and one…

Connectwise
23
Feb
2024

Update now! ConnectWise ScreenConnect vulnerability needs your attention

ConnectWise is warning self-hosted and on-premise customers that they need to take immediate action to remediate a critical vulnerability in…

Why ransomware gangs love using RMM tools—and how to stop them
22
Feb
2024

Why ransomware gangs love using RMM tools—and how to stop them

One of the most alarming trends our ThreatDown Intelligence team has noticed lately is the increased exploitation of legitimate Remote…

8 phones with text balloons
22
Feb
2024

Signal to shield user phone numbers by default

Chat app Signal will shield user’s phone numbers by default from now on. And, it will no longer be necessary…

spying kitty
21
Feb
2024

Vibrator virus steals your personal information

I know that some of you are expecting a post similar to that about a toothbrush botnet, but this is…

Great wall of China
21
Feb
2024

A first analysis of the i-Soon data leak

Data from a Chinese cybersecurity vendor that works for the Chinese government has exposed a range of hacking tools and…