Category: MalwareBytes

Malwarebytes introduces native ARM support for Windows devices 
19
Feb
2025

Malwarebytes introduces native ARM support for Windows devices 

For the last four years, Malwarebytes has been protecting ARM-based machines running on Apple’s M-series processors. Now, we’ve expanded our…

Google logo
19
Feb
2025

Google now allows digital fingerprinting of its users

In the ongoing saga that is Google’s struggle to replace tracking cookies, we have entered a new phase. But whether that’s…

The Apple logo in grey
19
Feb
2025

Macs targeted by info stealers in new era of cyberthreats

The latest, major threats to Mac computers can steal passwords and credit card details with delicate precision, targeting victims across…

internal mechanism hard drive
19
Feb
2025

Hard drives containing sensitive medical data found in flea market

Somebody bought a batch of 15 GB hard drives from a flea market, and during a routine check of the…

week in security
17
Feb
2025

A week in security (February 10 – February 16)

February 14, 2025 – A cybercriminal stole a reported 12 million data records on Zacks’ customers and clients. February 13,…

Zacks logo
14
Feb
2025

12 Million Zacks accounts leaked by cybercriminal

A cybercriminal claimed to have stolen 15 million data records from the customers and clients of the company Zacks—a number…

Google Gmail logo
14
Feb
2025

How AI was used in an advanced phishing campaign targeting Gmail users

In May, 2024, the FBI warned about the increasing threat of cybercriminals using Artificial Intelligence (AI) in their scams. At…

Image of a phone with an Etsy logo on it in front of boxes and a shopping trolley
12
Feb
2025

Fake Etsy invoice scam tricks sellers into sharing credit card information 

This article was researched and written by Stefan Dasic, manager, research and response for ThreatDown, powered by Malwarebytes. As an…

Gambling firms are secretly sharing your data with Facebook 
12
Feb
2025

Gambling firms are secretly sharing your data with Facebook 

While you might think you’re hitting the jackpot, whether you’ve consented to it or not, online gambling sites are playing…

A fishing line that has hooked an important file is being retrieved from a mobile phone. Illustration.
11
Feb
2025

Phishing evolves beyond email to become latest Android app threat

There are plenty of phish in the sea, and the latest ones have little interest in your email inbox. In…

patched Apple
11
Feb
2025

Apple fixes zero-day vulnerability used in “extremely sophisticated attack”

Apple has released an emergency security update for a vulnerability which it says may have been exploited in an “extremely…

iCloud logo
11
Feb
2025

Apple ordered to grant access to users’ encrypted data

Last week, an article in the Washington Post revealed the UK had secretly ordered Apple to provide blanket access to…