Category: MalwareBytes

What the channel needs to know to stay ahead of threats
05
Apr
2023

What the channel needs to know to stay ahead of threats

There are 5 cyberthreats for channel partners to focus on in 2023. The channel, comprising managed service providers (MSPs), Systems…

A week in security (March 27 - April 2)
04
Apr
2023

A week in security (March 27 – April 2)

Last week on Malwarebytes Labs: Solving the password’s hardest problem with passkeys, featuring Anna Pobletts Food giant Dole reveals more…

TikTok logo
04
Apr
2023

TikTok, what’s going on and should I be worried?

TikTok has garnered a ton of media attention about its alleged risks. But is it really that much worse than…

an RCE vulnerability in Azure Service Fabric Explorer
04
Apr
2023

an RCE vulnerability in Azure Service Fabric Explorer

Researchers disclosed how they found a remote code execution vulnerability in Azure Service Fabric Explorer. Researchers at Orca Security disclosed how…

how to spot a verified account
04
Apr
2023

how to spot a verified account

Significant changes to Twitter’s verification identifiers mean new rules for ensuring whether an account is real. Twitter has made some…

New macOS malware steals sensitive info, including a user's entire Keychain database
04
Apr
2023

New macOS malware steals sensitive info, including a user’s entire Keychain database

MacStealer could be an infamous stealer in the making, but right now, it needs improvement, according to Malwarebytes expert. A…

Steer clear of this EE phish that wants your card details
01
Apr
2023

Steer clear of this EE phish that wants your card details

We take a look at a phish targeting users of the EE mobile network. Watch out for this piece of…

3 tips for creating backups you can rely on when ransomware strikes
01
Apr
2023

3 tips for creating backups you can rely on when ransomware strikes

Backups are your last line of defense against ransomware, if they work. Backups are an organization’s last line of defense…

3 tips to raise your backup game
01
Apr
2023

3 tips to raise your backup game

Because backups are the dental floss of cybersecurity—the thing that everyone knows they should do, that everyone intends to do,…

Smart home assistants at risk from NUIT ultrasound attack
31
Mar
2023

Smart home assistants at risk from NUIT ultrasound attack

We take a look at research for an IoT attack called NUIT, capable of hijacking voice assistants via ultrasonic attack….

3CX desktop app used in a supply chain attack
31
Mar
2023

3CX desktop app used in a supply chain attack

Researchers have found that the 3CX desktop app may be compromised and used in supply chain attacks. Researchers have found…

Bing and other Microsoft applications fall victim to account takeover flaw
31
Mar
2023

Bing and other Microsoft applications fall victim to account takeover flaw

We take a look at the “BingBang” flaw which allowed for search engine manipulation in Bing. Researchers from Wiz have…