Tag: Malwarebytes Labs

The cybersecurity skills gap is misunderstood

Read the original article: The cybersecurity skills gap is misunderstood The cybersecurity skills gap is misunderstood. Rather than a lack of talent, there is a lack of understanding in how to find and hire that talent. Categories: Business Tags: (ISC)Aspen…

A week in security (August 17 – 23)

Read the original article: A week in security (August 17 – 23) A roundup of cybersecurity news from August 17 – 23, including our Enduring from Home report, and the impact of COVID-19 on healthcare security. Categories: A week in…

The impact of COVID-19 on healthcare cybersecurity

Read the original article: The impact of COVID-19 on healthcare cybersecurity COVID-19 has put incredible pressure on the healthcare sector. How did the pandemic impact healthcare cybersecurity? Categories: Vital infrastructure Tags: covid-19healthcarehealthcare cybersecurityhealthcare securitysecurity (Read more…) The post The impact…

Explosive technology and 3D printers: a history of deadly devices

Read the original article: Explosive technology and 3D printers: a history of deadly devices We look at how successful hardware hacks can damage devices—and potentially even put lives at risk. Categories: Hacking Tags: 3d printerhackershackinghackshardwareIoTmalwareprinterstuxnet (Read more…) The post Explosive…

Chrome extensions that lie about their permissions

Read the original article: Chrome extensions that lie about their permissions Users have learned to review the list of permissions Chrome extensions require before installing them from the webstore. But what’s the use if they lie to you? Categories: PUP…

The skinny on the Instacart breach

Read the original article: The skinny on the Instacart breach With the sudden popularity of grocery and pick-up services in this pandemic era, online criminals were swift to target and compromise Instacart. How did it happen? Categories: Hacking Tags: credential…

A week in security (August 3 – 9)

Read the original article: A week in security (August 3 – 9) A roundup of cybersecurity news from August 3 – 9, including a look at business email compromises, a new data privacy bill, and the Inter skimming attack. Categories:…

Inter skimming kit used in homoglyph attacks

Read the original article: Inter skimming kit used in homoglyph attacks Threat actors load credit card skimmers using a known phishing technique called homoglyph attacks. Categories: Threat analysis Tags: credit card skimminghomoglyphInterkitMagecartskimmersskimming (Read more…) The post Inter skimming kit used…

Business email compromise: gunning for goal

Read the original article: Business email compromise: gunning for goal We look at the latest happenings in the world of business email compromise (BEC). Categories: Cybercrime Social engineering Tags: becbusiness cybersecurityBusiness Email CompromiseCEO scamCFO fraudemailmail (Read more…) The post Business…

Avoid these PayPal phishing emails

Read the original article: Avoid these PayPal phishing emails We cover some recent PayPal phish mails and link to anti-phish resources. Categories: Cybercrime Social engineering Tags: account is limitedintl-limitedPayPalphishphishingscam (Read more…) The post Avoid these PayPal phishing emails appeared first…

Malspam campaign caught using GuLoader after service relaunch

Read the original article: Malspam campaign caught using GuLoader after service relaunch We discovered a spam campaign distributing GuLoader in the aftermath of the service’s relaunch Categories: Malware Threat analysis Tags: GuLoadermalspammalwarespamstealer (Read more…) The post Malspam campaign caught using…

Cloud workload security: Should you worry about it?

Read the original article: Cloud workload security: Should you worry about it? While the cloud workload is growing at a rapid pace, isn’t it time to start worrying about securing it? Categories: Business Tags: application layercloudcloud resourcescloud workload securitycontainerizationdatahypervisor layersecure-by-designsecurity…

TikTok is being discouraged and the app may be banned

Read the original article: TikTok is being discouraged and the app may be banned Companies and organizations are dicouraging their employees to use TikTok, especially on work related devices. Will TikTok face a ban? Categories: Privacy Tags: amazonAustraliabanbytedancechinaindiaprivacyredditsocial mediatiktokusa (Read…

A week in security (July 20 – 26)

Read the original article: A week in security (July 20 – 26) A roundup of cybersecurity news from July 20 – 26, including Deepfakes, Bluetooth technology, and APT groups. Categories: A week in security Tags: a week in securityadvanced persistent…

EncroChat system eavesdropped on by law enforcement

Read the original article: EncroChat system eavesdropped on by law enforcement Dutch law enforcement cracked the encryption on EncroChat, a secure messaging platform popular with criminals, and made hundreds of arrests. But is this a dangerous precedent? Categories: Hacking Tags:…

It’s baaaack: Public cyber enemy Emotet has returned

Read the original article: It’s baaaack: Public cyber enemy Emotet has returned Read more…) The post It’s baaaack: Public cyber enemy Emotet has returned appeared first on Malwarebytes Labs.   Advertise on IT Security News. Read the original article: It’s…

How exposed are you to cybercrime?

Read the original article: How exposed are you to cybercrime? Passwordmanagers.co measures exposure to cybercrime by weighing risk of cyberattack against an organization’s security preparedness. How exposed are you? Categories: Cybercrime Tags: cybercrimecybercrime exposurecybersecurity exposure indexcybersecurity hygieneexposure ratepassword managerpassword managers…

Coordinated Twitter attack rakes in 100 grand

Read the original article: Coordinated Twitter attack rakes in 100 grand In a social engineering attack on Twitter, threat actors managed to scam $100,000 dollars in Bitcoin by taking over high-profile accounts. Categories: Social engineering Tags: 2fabitcoinSocial Engineeringtweetstwitterverified accounts (Read…

Website misconfigurations and other errors to avoid

Read the original article: Website misconfigurations and other errors to avoid Website misconfigurations can lead to hacking, malfunction, and worse. We take a look at recent mishaps and advise site owners on how to lock down their platforms. Categories: How-tos…

A week in security (July 6 – 12)

Read the original article: A week in security (July 6 – 12) A roundup of cybersecurity news from July 6 – 12, including a look at pre-installed malware on some Android phones, and a Mac malware mystery. Categories: A week…

Threat spotlight: WastedLocker, customized ransomware

Read the original article: Threat spotlight: WastedLocker, customized ransomware WastedLocker ransomware, attributed to the Russian Evil Corp gang, is such a targeted threat, you might call it a custom-built ransomware family. Categories: Threat spotlight Tags: evil corpRansom.BinADSransomwarewastedwastedlocker (Read more…) The…

Credit card skimmer targets ASP.NET sites

Read the original article: Credit card skimmer targets ASP.NET sites This unusual web skimmer campaign goes after sites running Microsoft’s IIS servers with an outdated version of the ASP.NET framework. Categories: Threat analysis Tags: ASP.netcredit cardcredit card skimmercredit card skimmingdigital…

Do Chromebooks need antivirus protection?

Read the original article: Do Chromebooks need antivirus protection? You may have heard that installing a Chromebook antivirus program is unnecessary. We take a look at the Chromebook’s security features and weigh in on whether that’s true. Categories: Opinion Tags:…

New Mac ransomware spreading through piracy

Read the original article: New Mac ransomware spreading through piracy We analyze a new Mac ransomware that appears to encrypt user files with a bit of a time delay. Categories: Mac Tags: AbletonAbleton LiveencryptFindzipFindzip ransomwareLittle Snitchmacmac malwareMixed In Keyransomwaretime delay…

A week in security (June 22 – 28)

Read the original article: A week in security (June 22 – 28) A roundup of cybersecurity news from June 22 – 28, inlcuding a zero day guide, tax season tips, and web skimmers using image files. Categories: A week in…

Facial recognition: tech giants take a step back

Read the original article: Facial recognition: tech giants take a step back Some of the big players in the field of facial recognition announced they will not provide their technology to law enforcement while there is no governing law. Categories:…

End of line: supporting IoT in the home

Read the original article: End of line: supporting IoT in the home Warranties which may not warranty, certificates which might fail to certify, lifespans which don’t match the length of cover promised. This could be IoT. Categories: Cybercrime Privacy Tags:…

VPNs: should you use them?

Read the original article: VPNs: should you use them? We’ve been getting questions about VPNs that are more advanced than before. It isn’t so much what a VPN is, as it is whether people should use them. Categories: Malwarebytes news…

A week in security (June 8 – 14)

Read the original article: A week in security (June 8 – 14) A roundup of news and blog posts from the week of June 8 – 14, including the Honda ransomware attack, search hijackers, and what to look for in…

ParetoLogic facing complaint of alleged wrongdoing

Read the original article: ParetoLogic facing complaint of alleged wrongdoing After Revenuewire settled with the FTC, its sister company ParetoLogic has to appear in court. They are sued in a US class-action by a disgruntled customer. Categories: Tech support scams…

New LNK attack tied to Higaisa APT discovered

Read the original article: New LNK attack tied to Higaisa APT discovered We describe a new spearphishing campaign tied to the potential North Korean Higaisa APT group. Categories: Malware Threat analysis Tags: APTHigaisakoreaLNKPlugXrat (Read more…) The post New LNK attack…

Sodinokibi ransomware gang auctions off stolen data

Read the original article: Sodinokibi ransomware gang auctions off stolen data The Sodinokibi ransomware operators have opened an auction site to sell the stolen data of their victims to the highest bidder. Categories: Ransomware Tags: auctionhappy blogransomransomwareSodinokibi (Read more…) The…

A week in security (May 25 – 31)

Read the original article: A week in security (May 25 – 31) A roundup of news and blog posts from the week of May 25 – 31 Categories: A week in security Tags: awiscybrsecurityfakefake newsfraudmalwarenewspandemicroundupscamweek in security (Read more…) The…

Maze: the ransomware that introduced an extra twist

Read the original article: Maze: the ransomware that introduced an extra twist Maze ransomware attacks featured the first group of cyber-criminals to add the threat of publishing exfiltrated data to the ransomware business model Categories: Threat spotlight Tags: dataFalloutMazepulseransomwareSpelevovpn (Read…

Coalition Against Stalkerware bulks up global membership

Read the original article: Coalition Against Stalkerware bulks up global membership The Coalition Against Stalkerware brought aboard 11 new organizations to address the potentially dangerous capabilities of stalkerware. Categories: Stalkerware Tags: Anonyome LabsAppEsteem Corporationbff Bundesverband Frauenberatungsstellen und FrauennotrufeCentre Hubertine AuclertCoalition…

Going dark: encryption and law enforcement

Read the original article: Going dark: encryption and law enforcement There’s been a lot of talk recently about encryption and how law enforcement can’t convict criminals without encryption keys. We beg to differ. Categories: Government Privacy Security world Tags: backdoorDepartment…

Shining a light on “Silent Night” Zloader/Zbot

Read the original article: Shining a light on “Silent Night” Zloader/Zbot The latest Malwarebytes Threat Intel report focuses on Silent Night, a new banking Trojan recently tracked as Zloader/Zbot. Categories: Malware Threat analysis Tags: banking Trojanbanking TrojansHYASsilent nightterdotzbotZeusZloader (Read more…)…

When the coronavirus infodemic strikes

Read the original article: When the coronavirus infodemic strikes What are the biggest social media platforms doing to combat the rise in COVID-19 conspiracy theories spreading online? Categories: Scams Tags: archiveconspiracy theoriesconspiracy theorycoronaviruscovid-19facebookinfodemicscamssocial mediaspamtiktoktwittervideosyoutube (Read more…) The post When the…

A week in security (May 11 – May 17)

Read the original article: A week in security (May 11 – May 17) A roundup of the previous week’s security news, including attacks at MobiFriends, Cognizant, WeLeakData, and Magellan Health plus more news. Categories: A week in security Tags: air-gappedcognizantearn…

How CVSS works: characterizing and scoring vulnerabilities

Read the original article: How CVSS works: characterizing and scoring vulnerabilities CVSS, or Common Vulnerability Scoring System, provides developers, testers, and security professionals with a standardized process to assess vulnerabilities. Categories: Malwarebytes news Tags: attack complexityattack vectorbug bountycommon vulnerability scoring…

RevenueWire to pay $6.7 million to settle FTC charges

Read the original article: RevenueWire to pay $6.7 million to settle FTC charges The FTC filed a complaint against payment provider RevenueWire and its CEO for laundering credit card payments and facilitating and assisting in fraud. Categories: Tech support scams…

Data privacy law updates eyed by Singapore

Read the original article: Data privacy law updates eyed by Singapore Data privacy updates—including data portability and a data breach notification requirement—are being considered by Singapore’s government. Categories: Malwarebytes news Privacy Tags: CaliforniaCalifornia Consumer Privacy Actdata breach notificationdata breach notification…

Credit card skimmer masquerades as favicon

Read the original article: Credit card skimmer masquerades as favicon Criminals register fake domain to hide their web skimmer as an innocuous image file. Categories: Threat analysis Tags: ants and cockroachcredit carcredit card skimmerfaviconMagecartmagentoskimmer (Read more…) The post Credit card…

Explained: cloud-delivered security

Read the original article: Explained: cloud-delivered security What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might. Categories: Explained Tags: cloudiaasidentity managementMSPpaassaassmaller businesses (Read more…)…

A week in security (April 27 – May 3)

Read the original article: A week in security (April 27 – May 3) A roundup of the previous week’s security news, including cloud data protection, Troldesh, VPNs, the cybercrime economy, and more. Categories: Malwarebytes news Tags: AppleAPTawisbluetoothbluetooth attackBluetooth vulnerabilitiesCivicSmartcloud securitycoronaviruscovid-19hackedhospitalsJITjust…

What to do when you receive an extortion email

Read the original article: What to do when you receive an extortion email Extortion emails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such a message and want…

What to do when you receive an extortion e-mail

Read the original article: What to do when you receive an extortion e-mail xtortion e-mails are nothing new, but with the recent increase in frequency, many people are looking for guidance. If you have received such an e-mail message and…

Cybersecurity and the economy: when recession strikes

Read the original article: Cybersecurity and the economy: when recession strikes Could a recession brought on by the current COVID-19 pandemic cause an increase in cybercrime? Did cybercrime increase during the recession of 2009? Or is this just too complex…

VPNs are mainstream, which is good news

Read the original article: VPNs are mainstream, which is good news According to a recent report, the use of virtual private networks (VPNs) has been on a steady growth since 2017. During this coronavirus season, that growth has been palpable—but…

Threat actors release Troldesh decryption keys

Read the original article: Threat actors release Troldesh decryption keys On GitHub a user called shade-team released hundreds of thousands of Troldesh decryption keys. Can victims of the ransomware safely use them to decrypt their files? Categories: Ransomware Tags: decryption…

Introducing Malwarebytes Privacy

Read the original article: Introducing Malwarebytes Privacy It’s important to use a VPN you can trust to protect your privacy on the Internet. That’s why we launched Malwarebytes Privacy, a next-gen VPN for better privacy, performance, and security when you…

iOS Mail bug allows remote zero-click attacks

Read the original article: iOS Mail bug allows remote zero-click attacks A newly-discovered vulnerability in iOS Mail can be used to attack an iPhone remotely using a malicious e-mail message, even if you’re running the latest version of iOS (13.4.1).…

A week in security (April 13 – 19)

Read the original article: A week in security (April 13 – 19) A roundup of the previous week’s security news, including phishing scams, coronavirus scams, Apple scams, and more. Categories: A week in security Tags: adwareAndroidcoronavirusmalwarephishweek in securityweekly roundup (Read…

Discord users tempted by bots offering “free Nitro games”

Read the original article: Discord users tempted by bots offering “free Nitro games” We look at a wave of bots promoting free games on Discord. But is everything as it seems? Categories: Cybercrime Tags: botsdiscordgamingspamstreamingtwitchvideogames (Read more…) The post Discord…

New AgentTesla variant steals WiFi credentials

Read the original article: New AgentTesla variant steals WiFi credentials The popular infostealer AgentTesla recently added a new feature that can steal WiFi usernames and passwords. Categories: Cybercrime Malware Tags: Agent Teslamalwarewifi (Read more…) The post New AgentTesla variant steals…

Mass surveillance alone will not save us from coronavirus

Read the original article: Mass surveillance alone will not save us from coronavirus As governments roll out enormous data collection programs to limit coronavirus, we should remember that mass surveillance alone will not save us. Categories: Opinion Tags: AppleAustriabluetoothBluetooth contact…

Keep Zoombombing cybercriminals from dropping a load on your meetings

In a zeitgeisty moment, Zoom has become the web conference tool of choice for everyone. Unfortunately, cybercriminals are taking note and Zoombooming the public. We show readers how to protect against this intrusion of privacy. Categories: How-tos Tags: coronaviruscovid-19exploitexploitshow-to zoomteleconferencingvirtual…