Category: MalwareBytes

Understanding ransomware reinfection: An MDR case study
28
Jun
2023

Understanding ransomware reinfection: An MDR case study

Ransomware is like that stubborn cold that you thought you kicked, but creeps back up determined to run amok again….

A week in security (June 19 - 25)
27
Jun
2023

A week in security (June 19 – 25)

Last week on Malwarebytes Labs: Microsoft Azure AD flaw can lead to account takeover 5 facts to know about the…

OpenSSH trojan campaign targets Linux systems and IoT devices
27
Jun
2023

OpenSSH trojan campaign targets Linux systems and IoT devices

Poorly configured Linux and Internet of Things (IoT) devices are at risk of compromise from a cryptojacking campaign. Poorly configured…

A stealthy precursor to infostealers and ransomware attacks
27
Jun
2023

A stealthy precursor to infostealers and ransomware attacks

Malvertising, the practice of using online ads to spread malware, can have dire consequences—and the problem only seems to be…

9 basic security tips for seniors
27
Jun
2023

9 basic security tips for seniors

Help the people around you that are less computer literate with some basic security tips and settings. Before we get…

5 facts to know about the Royal ransomware gang
24
Jun
2023

5 facts to know about the Royal ransomware gang

A quick look the cybercriminal group known as Royal—one of the fastest growing ransomware gangs today. When we first introduced…

Microsoft Azure AD flaw can lead to account takeover
24
Jun
2023

Microsoft Azure AD flaw can lead to account takeover

Researchers have found a flaw in Microsoft Azure AD which they claim can be used to take over accounts that…

6 tips for a cybersecure honeymoon
23
Jun
2023

6 tips for a cybersecure honeymoon

Your big day is over, but while you’re relaxing on honeymoon you don’t want to get distracted by security problems….

Reducing your attack surface is more effective than playing patch-a-mole
23
Jun
2023

Reducing your attack surface is more effective than playing patch-a-mole

There is a lot to be said for the strategy of shielding management interfaces from public internet access On June…

Update now! Apple fixes three actively exploited vulnerabilities
23
Jun
2023

Update now! Apple fixes three actively exploited vulnerabilities

Apple has released security updates for several products to address a set of flaws it said were being actively exploited….

UPS warns customers of phishing attempts after data accessed
23
Jun
2023

UPS warns customers of phishing attempts after data accessed

UPS is warning Canadian customers of potential phishing attempts after data was left accessible via look-up tool. UPS Canada is…

Malwarebytes only vendor to win every MRG Effitas award in 2022 & 2023
23
Jun
2023

Malwarebytes only vendor to win every MRG Effitas award in 2022 & 2023

Dive into where we prevented more than the rest and how we were able to do it. MRG Effitas, a…