Domen toolkit gets back to work with new malvertising campaign

Credit to Author: Threat Intelligence Team| Date: Fri, 28 Feb 2020 17:54:18 +0000

We describe the latest malvertising campaign that uses Domen, an advanced social engineering toolkit.

Categories:

Tags:

(Read more…)

The post Domen toolkit gets back to work with new malvertising campaign appeared first on Malwarebytes Labs.

Read more

Battling online coronavirus scams with facts

Credit to Author: David Ruiz| Date: Mon, 10 Feb 2020 16:56:49 +0000

New online scams have preyed on the public’s fear about coronavirus outbreak. Don’t be fooled. Here is what we know about coronavirus and its related scams.

Categories:

Tags:

(Read more…)

The post Battling online coronavirus scams with facts appeared first on Malwarebytes Labs.

Read more

Spear phishing 101: what you need to know

Credit to Author: Malwarebytes Labs| Date: Wed, 29 Jan 2020 18:50:01 +0000

We look at the threat of spear phishing, why it’s such a problem, and what organizations can do to lessen the chance of a successful attack.

Categories:

Tags:

(Read more…)

The post Spear phishing 101: what you need to know appeared first on Malwarebytes Labs.

Read more

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

Credit to Author: Jérôme Segura| Date: Wed, 22 Jan 2020 16:00:00 +0000

We reveal the inner workings of WOOF locker, the most sophisticated browser locker campaign we’ve seen to date. Learn how this tech support scam evades researchers and ensnares users by hiding in plain sight.

Categories:

Tags:

(Read more…)

The post WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation appeared first on Malwarebytes Labs.

Read more

How to prevent a rootkit attack

Credit to Author: Gilad Maayan| Date: Tue, 14 Jan 2020 17:31:55 +0000

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Categories:

Tags:

(Read more…)

The post How to prevent a rootkit attack appeared first on Malwarebytes Labs.

Read more

6 ways hackers are targeting retail businesses

Credit to Author: Kayla Matthews| Date: Wed, 08 Jan 2020 18:04:10 +0000

Whether it’s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.

Categories:

Tags:

(Read more…)

The post 6 ways hackers are targeting retail businesses appeared first on Malwarebytes Labs.

Read more

Security resolutions for 2020 to stay safe online!

Credit to Author: Pavan Thorat| Date: Tue, 31 Dec 2019 12:31:33 +0000

As we are about to enter the new year, it’s ritualistic to reflect on our experiences from the passing year and make resolutions for the New Year. Most people make resolutions around good heath, their life goals, etc. Here is a different angle to our routine resolutions’ list – Security…

Read more

Spelevo exploit kit debuts new social engineering trick

Credit to Author: Jérôme Segura| Date: Wed, 18 Dec 2019 16:00:00 +0000

In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.

Categories:

Tags:

(Read more…)

The post Spelevo exploit kit debuts new social engineering trick appeared first on Malwarebytes Labs.

Read more

Fake Elder Scrolls Online developers go phishing on PlayStation

Credit to Author: Christopher Boyd| Date: Fri, 06 Dec 2019 20:29:26 +0000

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Categories:

Tags:

(Read more…)

The post Fake Elder Scrolls Online developers go phishing on PlayStation appeared first on Malwarebytes Labs.

Read more

Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read more