5 ways to find and fix open source vulnerabilities

A recent discovery of surreptitious execution of cryptomining code by a sandboxed app, riding piggyback on the open source software (OSS) ecosystem, raises pertinent questions about open source vulnerabilities. Here are five ways developers can fi… Continue reading 5 ways to find and fix open source vulnerabilities

Cybercrime tactics & techniques Q2 2018

The last quarter is likely the last hurrah of the campaigns and attacks we’ve been seeing over the last 6 months. What comes next may completely change the game. Check out our latest Cybercrime Tactics & Techniques report to find out more abo… Continue reading Cybercrime tactics & techniques Q2 2018

A week in security (July 9 – July 15)

A roundup of the security news from July 9 – July 15, including sextortion, Spectre, cryptomining, mobile malware, ICO scams and more.
Categories:

Security world
Week in security

Tags: ad blockersandroid malwarecrypto miningdata breachdomestic … Continue reading A week in security (July 9 – July 15)

Block all or nothing to prevent ICO fraud?

Unfortunately, most ICOs (Initial Coin Offerings) turn out to be scams. So we feel compelled to ask our customers: would you like us to protect you from aal of them?
Categories:

Security world
Technology

Tags: ico fraudInitial Coin Offeringprot… Continue reading Block all or nothing to prevent ICO fraud?

We block shady ad blockers

Some of you have reached out to us concerning Malwarebytes blocking of certain Ad blocking extensions, or an influx in web blocking notifications.  First things first, this is not a False Positive. 
Categories:

Cybercrime

Tags: adblo… Continue reading We block shady ad blockers

A week in security (July 2 – July 8)

A roundup of the security news from July 2 – July 8, including a macro-less infection tecnique, online project management tools and crypto-mining malware campaigns.
Categories:

Security world
Week in security

Tags: crypto miningmacro-lessprojec… Continue reading A week in security (July 2 – July 8)

A week in security (June 25 – July 1)

A round up of the security news from June 25 – July 1, including a look at the EU cyber force proposal, cryptomining dialing things down, and the risks of handing out personal information online.
Categories:

Security world
Week in security… Continue reading A week in security (June 25 – July 1)

A week in security (June 18 – June 24)

A roundup of security news from June 18 – 24 that includes the SamSam ransomware, DNS rebinding, a World Cup phishing campaign, and lots and lots of Android malware.
Categories:

Security world
Week in security

Tags: android malwareandroid… Continue reading A week in security (June 18 – June 24)

PSA: Recruitment portals and job sites at risk

We’ve warned job seekers to be wary of phishing attacks, and we’re now doing the same for recruitment professionals: Beware of your recruitment portals, as they may play host to a lot of bad apples who—trust us—you wouldn’t want to hir… Continue reading PSA: Recruitment portals and job sites at risk

SamSam ransomware: controlled distribution for an elusive malware

SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks.
Categories:

Malware
Threat analysis

Tags: ransomwaresamsamsamsam ransomware

(Read more…)

The post SamS… Continue reading SamSam ransomware: controlled distribution for an elusive malware