Category: Malwarebytes Labs

QR code scams are making a comeback

Read the original article: QR code scams are making a comeback With QR codes being used more as a means to help create a COVID-19 proof environment, we’re also seeing a comeback of QR codes scams. Categories: Scams Tags: advance…

FIFA 21 game scams: watch out for unsporting conduct

Read the original article: FIFA 21 game scams: watch out for unsporting conduct With the recent launch of the new FIFA 2021 video game, we look at some of the common scams to avoid. Categories: Cybercrime Social engineering Tags: coinsEAfakeFIFAfootballFUTgamesoriginscamsocial…

Amazon Prime Day—8 tips for safer shopping

Read the original article: Amazon Prime Day—8 tips for safer shopping Amazon Prime Day is here. With the ongoing pandemic further complicating life as we know it, how can you, the practical and cyber-sensible shopper, protect yourself from threats banking…

Credit card skimmer targets virtual conference platform

Read the original article: Credit card skimmer targets virtual conference platform Criminals have gone after an online conference platform to steal credit card data from virtual attendees. Categories: Malwarebytes news Tags: InterMagecartskimmer (Read more…) The post Credit card skimmer targets…

Healthcare security update: death by ransomware, what’s next?

Read the original article: Healthcare security update: death by ransomware, what’s next? Read more…) The post Healthcare security update: death by ransomware, what’s next? appeared first on Malwarebytes Labs.   Advertise on IT Security News. Read the original article: Healthcare…

A week in security (September 28 – October 4)

Read the original article: A week in security (September 28 – October 4) A roundup of the best cybersecurity stories from September 28 – October 4, including several tricky cases ransomware installed on… coffee makers? Categories: A week in security…

Introducing VideoBytes, by Malwarebytes Labs

Read the original article: Introducing VideoBytes, by Malwarebytes Labs This week, we’re launching VideoBytes, a new video series featuring research from Adam Kujawa, security evangelist and a director for Malwarebytes Labs. Categories: VideoBytes Tags: Explainedmalwarebytes labsplease don’t buy thisransomwarethreat cinemaTwitter…

Caught in the payment fraud net: when, not if?

Read the original article: Caught in the payment fraud net: when, not if? Will we be stuck with payment fraud forever? Come with us as we explore what can go wrong, and why you shouldn’t blame yourself if you suffer…

Taurus Project stealer now spreading via malvertising campaign

Read the original article: Taurus Project stealer now spreading via malvertising campaign The Taurus Project stealer gains an additional distribution vector via exploit kit. Categories: Malwarebytes news Tags: exploit kitsFallout EKmalvertisingpredator the thiefstealertaurus (Read more…) The post Taurus Project stealer…

Phishers spoof reliable cybersecurity training company to garner clicks

Read the original article: Phishers spoof reliable cybersecurity training company to garner clicks In a recent campaign, phishers were seen taking advantage of user trust on KnowBe4 and stealing their work email credentials. Categories: Scams Tags: Cofensecybersecurity trainingKnowBe4phishingphishing scamratremote access…

A week in security (September 14 – 20)

Read the original article: A week in security (September 14 – 20) A round up of cybersecurity news from September 14 – 20, including the Zerologon exploit, BLURtooth vulnerability, APT41, and phishing scams. Categories: A week in security Tags: apt41blurtoothcharitiesChinesechrome…

Fintech industry developments, differences between Europe and the US

Read the original article: Fintech industry developments, differences between Europe and the US The developments in fintech differ between regions due to legislation. How does that effect the industry and the safety of their customers? Categories: Business Tags: brexitfintechgdprlegislationonline shoppingpci…

Fintech industry developments, differences between Europe and the US

Read the original article: Fintech industry developments, differences between Europe and the US The developments in fintech differ between regions due to legislation. How does that effect the industry and the safety of their customers? Categories: Business Tags: brexitfintechgdprlegislationonline shoppingpci…

The informed voter’s guide to election cyberthreats

Read the original article: The informed voter’s guide to election cyberthreats Read more…) The post The informed voter’s guide to election cyberthreats appeared first on Malwarebytes Labs.   Advertise on IT Security News. Read the original article: The informed voter’s…

Malvertising campaigns come back in full swing

Read the original article: Malvertising campaigns come back in full swing Threat actors monetize on adult traffic in several large malvertising campaigns. Categories: Social engineering Tags: ad networksbad adsexploit kitexploit kitsFallout EKmalvertisingmalvertising campaignsRIG EK (Read more…) The post Malvertising campaigns…

A week in security (August 31 – September 6)

Read the original article: A week in security (August 31 – September 6) A round up of the previous week’s most interesting security news and happenings. Categories: A week in security Tags: facebookmalwarephishround upscamsecuritytiktokweek in security (Read more…) The post…

Apple’s notarization process fails to protect

Read the original article: Apple’s notarization process fails to protect Read more…) The post Apple’s notarization process fails to protect appeared first on Malwarebytes Labs.   Advertise on IT Security News. Read the original article: Apple’s notarization process fails to…

Missing person scams: what to watch out for

Read the original article: Missing person scams: what to watch out for Missing person alerts can be a prime source of inspiration for scammers looking to turn a quick buck. We explore some of the techniques used to further ill-gotten…

The cybersecurity skills gap is misunderstood

Read the original article: The cybersecurity skills gap is misunderstood The cybersecurity skills gap is misunderstood. Rather than a lack of talent, there is a lack of understanding in how to find and hire that talent. Categories: Business Tags: (ISC)Aspen…

A week in security (August 17 – 23)

Read the original article: A week in security (August 17 – 23) A roundup of cybersecurity news from August 17 – 23, including our Enduring from Home report, and the impact of COVID-19 on healthcare security. Categories: A week in…

The impact of COVID-19 on healthcare cybersecurity

Read the original article: The impact of COVID-19 on healthcare cybersecurity COVID-19 has put incredible pressure on the healthcare sector. How did the pandemic impact healthcare cybersecurity? Categories: Vital infrastructure Tags: covid-19healthcarehealthcare cybersecurityhealthcare securitysecurity (Read more…) The post The impact…

Explosive technology and 3D printers: a history of deadly devices

Read the original article: Explosive technology and 3D printers: a history of deadly devices We look at how successful hardware hacks can damage devices—and potentially even put lives at risk. Categories: Hacking Tags: 3d printerhackershackinghackshardwareIoTmalwareprinterstuxnet (Read more…) The post Explosive…

Chrome extensions that lie about their permissions

Read the original article: Chrome extensions that lie about their permissions Users have learned to review the list of permissions Chrome extensions require before installing them from the webstore. But what’s the use if they lie to you? Categories: PUP…

The skinny on the Instacart breach

Read the original article: The skinny on the Instacart breach With the sudden popularity of grocery and pick-up services in this pandemic era, online criminals were swift to target and compromise Instacart. How did it happen? Categories: Hacking Tags: credential…

A week in security (August 3 – 9)

Read the original article: A week in security (August 3 – 9) A roundup of cybersecurity news from August 3 – 9, including a look at business email compromises, a new data privacy bill, and the Inter skimming attack. Categories:…

Inter skimming kit used in homoglyph attacks

Read the original article: Inter skimming kit used in homoglyph attacks Threat actors load credit card skimmers using a known phishing technique called homoglyph attacks. Categories: Threat analysis Tags: credit card skimminghomoglyphInterkitMagecartskimmersskimming (Read more…) The post Inter skimming kit used…

Business email compromise: gunning for goal

Read the original article: Business email compromise: gunning for goal We look at the latest happenings in the world of business email compromise (BEC). Categories: Cybercrime Social engineering Tags: becbusiness cybersecurityBusiness Email CompromiseCEO scamCFO fraudemailmail (Read more…) The post Business…

Avoid these PayPal phishing emails

Read the original article: Avoid these PayPal phishing emails We cover some recent PayPal phish mails and link to anti-phish resources. Categories: Cybercrime Social engineering Tags: account is limitedintl-limitedPayPalphishphishingscam (Read more…) The post Avoid these PayPal phishing emails appeared first…

Malspam campaign caught using GuLoader after service relaunch

Read the original article: Malspam campaign caught using GuLoader after service relaunch We discovered a spam campaign distributing GuLoader in the aftermath of the service’s relaunch Categories: Malware Threat analysis Tags: GuLoadermalspammalwarespamstealer (Read more…) The post Malspam campaign caught using…

Cloud workload security: Should you worry about it?

Read the original article: Cloud workload security: Should you worry about it? While the cloud workload is growing at a rapid pace, isn’t it time to start worrying about securing it? Categories: Business Tags: application layercloudcloud resourcescloud workload securitycontainerizationdatahypervisor layersecure-by-designsecurity…

TikTok is being discouraged and the app may be banned

Read the original article: TikTok is being discouraged and the app may be banned Companies and organizations are dicouraging their employees to use TikTok, especially on work related devices. Will TikTok face a ban? Categories: Privacy Tags: amazonAustraliabanbytedancechinaindiaprivacyredditsocial mediatiktokusa (Read…

A week in security (July 20 – 26)

Read the original article: A week in security (July 20 – 26) A roundup of cybersecurity news from July 20 – 26, including Deepfakes, Bluetooth technology, and APT groups. Categories: A week in security Tags: a week in securityadvanced persistent…

EncroChat system eavesdropped on by law enforcement

Read the original article: EncroChat system eavesdropped on by law enforcement Dutch law enforcement cracked the encryption on EncroChat, a secure messaging platform popular with criminals, and made hundreds of arrests. But is this a dangerous precedent? Categories: Hacking Tags:…

It’s baaaack: Public cyber enemy Emotet has returned

Read the original article: It’s baaaack: Public cyber enemy Emotet has returned Read more…) The post It’s baaaack: Public cyber enemy Emotet has returned appeared first on Malwarebytes Labs.   Advertise on IT Security News. Read the original article: It’s…

How exposed are you to cybercrime?

Read the original article: How exposed are you to cybercrime? Passwordmanagers.co measures exposure to cybercrime by weighing risk of cyberattack against an organization’s security preparedness. How exposed are you? Categories: Cybercrime Tags: cybercrimecybercrime exposurecybersecurity exposure indexcybersecurity hygieneexposure ratepassword managerpassword managers…

Coordinated Twitter attack rakes in 100 grand

Read the original article: Coordinated Twitter attack rakes in 100 grand In a social engineering attack on Twitter, threat actors managed to scam $100,000 dollars in Bitcoin by taking over high-profile accounts. Categories: Social engineering Tags: 2fabitcoinSocial Engineeringtweetstwitterverified accounts (Read…

Website misconfigurations and other errors to avoid

Read the original article: Website misconfigurations and other errors to avoid Website misconfigurations can lead to hacking, malfunction, and worse. We take a look at recent mishaps and advise site owners on how to lock down their platforms. Categories: How-tos…

A week in security (July 6 – 12)

Read the original article: A week in security (July 6 – 12) A roundup of cybersecurity news from July 6 – 12, including a look at pre-installed malware on some Android phones, and a Mac malware mystery. Categories: A week…

Threat spotlight: WastedLocker, customized ransomware

Read the original article: Threat spotlight: WastedLocker, customized ransomware WastedLocker ransomware, attributed to the Russian Evil Corp gang, is such a targeted threat, you might call it a custom-built ransomware family. Categories: Threat spotlight Tags: evil corpRansom.BinADSransomwarewastedwastedlocker (Read more…) The…

Credit card skimmer targets ASP.NET sites

Read the original article: Credit card skimmer targets ASP.NET sites This unusual web skimmer campaign goes after sites running Microsoft’s IIS servers with an outdated version of the ASP.NET framework. Categories: Threat analysis Tags: ASP.netcredit cardcredit card skimmercredit card skimmingdigital…

Do Chromebooks need antivirus protection?

Read the original article: Do Chromebooks need antivirus protection? You may have heard that installing a Chromebook antivirus program is unnecessary. We take a look at the Chromebook’s security features and weigh in on whether that’s true. Categories: Opinion Tags:…

New Mac ransomware spreading through piracy

Read the original article: New Mac ransomware spreading through piracy We analyze a new Mac ransomware that appears to encrypt user files with a bit of a time delay. Categories: Mac Tags: AbletonAbleton LiveencryptFindzipFindzip ransomwareLittle Snitchmacmac malwareMixed In Keyransomwaretime delay…

A week in security (June 22 – 28)

Read the original article: A week in security (June 22 – 28) A roundup of cybersecurity news from June 22 – 28, inlcuding a zero day guide, tax season tips, and web skimmers using image files. Categories: A week in…

Facial recognition: tech giants take a step back

Read the original article: Facial recognition: tech giants take a step back Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law. Categories:…

End of line: supporting IoT in the home

Read the original article: End of line: supporting IoT in the home Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT. Categories: Cybercrime Privacy Tags:…

VPNs: should you use them?

Read the original article: VPNs: should you use them? We’ve been getting questions about VPNs that are more advanced than before. It isn’t so much what a VPN is, as it is whether people should use them. Categories: Malwarebytes news…

A week in security (June 8 – 14)

Read the original article: A week in security (June 8 – 14) A roundup of news and blog posts from the week of June 8 – 14, including the Honda ransomware attack, search hijackers, and what to look for in…

ParetoLogic facing complaint of alleged wrongdoing

Read the original article: ParetoLogic facing complaint of alleged wrongdoing After Revenuewire settled with the FTC, its sister company ParetoLogic has to appear in court. They are sued in a US class-action by a disgruntled customer. Categories: Tech support scams…

New LNK attack tied to Higaisa APT discovered

Read the original article: New LNK attack tied to Higaisa APT discovered We describe a new spearphishing campaign tied to the potential North Korean Higaisa APT group. Categories: Malware Threat analysis Tags: APTHigaisakoreaLNKPlugXrat (Read more…) The post New LNK attack…

Sodinokibi ransomware gang auctions off stolen data

Read the original article: Sodinokibi ransomware gang auctions off stolen data The Sodinokibi ransomware operators have opened an auction site to sell the stolen data of their victims to the highest bidder. Categories: Ransomware Tags: auctionhappy blogransomransomwareSodinokibi (Read more…) The…