Category: MalwareBytes

A history of ransomware: How did it get this far?
08
Sep
2023

A history of ransomware: How did it get this far?

Today’s ransomware is the scourge of many organizations. But where did it start? If we define ransomware as malware that…

How Microsoft's highly secure environment was breached
08
Sep
2023

How Microsoft’s highly secure environment was breached

An investigation by Microsoft has finally revealed how China-based hackers circumvented its “highly isolated and restricted production environment” in May…

FreeWorld ransomware attacks MSSQL—get your databases off the Internet
07
Sep
2023

FreeWorld ransomware attacks MSSQL—get your databases off the Internet

A attack that uses a database as an entry point to a network reminds us that you should never expose…

Smart chastity device exposes sensitive user data
07
Sep
2023

Smart chastity device exposes sensitive user data

We take a look at reports of an IoT chastity cage device which is exposing user data. A security breach…

X wants your biometric data
07
Sep
2023

X wants your biometric data

We take a look at plans to voluntarily upload identification to X, the site formerly known as Twitter. Users of…

Mac users targeted in new malvertising campaign delivering Atomic Stealer
07
Sep
2023

Mac users targeted in new malvertising campaign delivering Atomic Stealer

While malvertising delivering infostealers has largely been a Windows problem, Mac users are getting targeted as well. Summary Malicious ads…

Password-stealing Chrome extension smuggled on to Web Store
06
Sep
2023

Password-stealing Chrome extension smuggled on to Web Store

Chrome browser extensions can steal passwords from the text input fields in websites, despite Chrome’s latest security and privacy standard,…

A week in security (August 28
05
Sep
2023

A week in security (August 28

A list of topics we covered in the week of August 28 to September 3, 2023. Last week on Malwarebytes…

Supply chain related security risks, and how to protect against them
05
Sep
2023

Supply chain related security risks, and how to protect against them

We take a look at the importance of supply chain cybersecurity and share some tips to enhance it. By definition,…

A firsthand perspective on the recent LinkedIn account takeover campaign
02
Sep
2023

A firsthand perspective on the recent LinkedIn account takeover campaign

It started with a password reset email in the middle of the night. Not long ago I wrote about a…

Victim records deleted after spyware vendor compromised
01
Sep
2023

Victim records deleted after spyware vendor compromised

We take a look at another compromise of a mobile spyware app maker, and ask whether this action comes with…

map of the world projected on a face
01
Sep
2023

Qakbot botnet infrastructure suffers major takedown

The Qakbot botnet has suffered a major setback after its infrastructure was heavily disrupted by US and European law enforcement…