Category: MalwareBytes

Facebook login screen
29
Feb
2024

Facebook bug could have allowed attacker to take over accounts

A vulnerability in Facebook could have allowed an attacker to take over a Facebook account without the victim needing to…

Stopping a targeted attack on a Managed Service Provider (MSP) with ThreatDown MDR
29
Feb
2024

Stopping a targeted attack on a Managed Service Provider (MSP) with ThreatDown MDR

In late January 2024, the ThreatDown Managed Detection and Response (MDR) team found and stopped a three-month long malware campaign…

healthcare image, a bed in an empty hospital hallway
28
Feb
2024

ALPHV is singling out healthcare sector, say FBI and CISA

In an updated #StopRansomware security advisory, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and…

One year later, Rhadamanthys is still dropped via malvertising
28
Feb
2024

One year later, Rhadamanthys is still dropped via malvertising

It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious…

Change Healthcare logo
28
Feb
2024

Change Healthcare outages reportedly caused by ransomware

On Wednesday February 21, 2024, Change Healthcare—a subsidiary of UnitedHealth Group—experienced serious system outages due to a cyberattack. In a…

A Trojan Horse on wheels breaks into the screen of a smartphone
27
Feb
2024

Android banking trojans: How they steal passwords and drain bank accounts

For the most popular operating system in the world—which is Android and it isn’t even a contest—there’s a sneaky cyberthreat…

A couple wearing a chicken and a fox mask.
27
Feb
2024

Identity theft is number one threat for consumers, says report

The German Federal Office for Information Security (BSI) has published a report on The State of IT Security in Germany…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
26
Feb
2024

How to make a fake ID online, with Joseph Cox: Lock and Code S05E05

This week on the Lock and Code podcast… For decades, fake IDs had roughly three purposes: Buying booze before legally…

week in security
26
Feb
2024

A week in security (February 19 – February 25)

Cybersecurity info you can’t live without Want to stay informed on the latest news in cybersecurity? Sign up for our…

Joomla logo
23
Feb
2024

Joomla! patches XSS flaws that could lead to remote code execution

On February 20, Joomla! posted details about four vulnerabilities it had fixed in its Content Management System (CMS), and one…

Connectwise
23
Feb
2024

Update now! ConnectWise ScreenConnect vulnerability needs your attention

ConnectWise is warning self-hosted and on-premise customers that they need to take immediate action to remediate a critical vulnerability in…

Why ransomware gangs love using RMM tools—and how to stop them
22
Feb
2024

Why ransomware gangs love using RMM tools—and how to stop them

One of the most alarming trends our ThreatDown Intelligence team has noticed lately is the increased exploitation of legitimate Remote…