Category: MalwareBytes

week in security
19
Feb
2024

A week in security (February 12 – February 18)

February 16, 2024 – A group of cybercriminals is committing bank fraud by convincing victims to scan their IDs and…

GoldPickaxe steals your coin
16
Feb
2024

GoldPickaxe Trojan steals your face!

Well, the GoldPickaxe Trojan does not literally steal your face, but it does steal an image of your face in…

Microsoft Exchange
16
Feb
2024

Microsoft Exchange vulnerability actively exploited

As it turns out, there was another actively exploited vulnerability included in Microsoft’s patch Tuesday updates for February. When Microsoft…

Massive utility scam campaign spreads via online ads
15
Feb
2024

Massive utility scam campaign spreads via online ads

For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their…

Remote Monitoring & Management software used in phishing attacks
15
Feb
2024

Remote Monitoring & Management software used in phishing attacks

Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,…

An empty trolley in front of a red wall
15
Feb
2024

Facebook Marketplace users’ stolen data offered for sale

Personal data belonging to Facebook Marketplace users has been published online, according to BleepingComputer. A cybercriminal was allegedly able to steal…

several patches
14
Feb
2024

Update now! Microsoft fixes two zero-days on February Patch Tuesday

Microsoft has issued patches for 73 security vulnerabilities in its February 2024 Patch Tuesday. Among these vulnerabilities are two zero-days…

State of Malware 2024
14
Feb
2024

How ransomware changed in 2023

In 2023, the CL0P ransomware gang broke the scalability barrier and shook the security world with a series of short,…

Logo for Malwarebytes Premium Security
14
Feb
2024

Malwarebytes crushes malware all the time

About a month ago, The PC Security Channel (TPSC) ran a test to check out the detection capabilities of Malwarebytes….

Remote Monitoring & Management software used in phishing attacks
13
Feb
2024

Remote Monitoring & Management software used in phishing attacks

Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,…

stalkerware header
13
Feb
2024

TheTruthSpy stalkerware, still insecure, still leaking data

In 2022, we published an article about how photographs of children taken by a stalkerware-type app were found exposed on…

roundcube logo
13
Feb
2024

Patch now! Roundcube mail servers are being actively exploited

The Cybersecurity & Infrastructure Security Agency (CISA) has added a vulnerability in Roundcube Webmail to its Known Exploited Vulnerabilities Catalog,…