A variant of a remote code execution vulnerability with Internet Explorer’s scripting engine known as CVE-2018-8373 patched last August has been found in…
Tag: exploit
‘Hidden Bee’ miner delivered via improved drive-by download toolkit
This blog post was authored by @hasherezade and Jérôme Segura. We recently detected a drive-by download attack trying to exploit CVE-2018-4878, a vulnerability in…
Use TeamViewer? Fix this dangerous permissions bug with an update
TeamViewer, the remote control/web conference program used to share files and desktops, is suffering from a case of “patch it now.”…
Fake IRS notice delivers customized spying tool
While macro-based documents and scripts make up for the majority of malspam attacks these days, we also see some campaigns that…
Petya-esque ransomware is spreading across the world
UPDATE 6/29/2017 1045 PST: According to information uncovered within Malwarebytes Labs, we have determined that this ransomware variant is coded to…
How did the WannaCry ransomworm spread?
Security researchers have had a busy week since the WannaCry ransomware outbreak that wreaked havoc on computers worldwide. News of the…
A week in security (Mar 6th – Mar 12th)
Last week, we had a bumper crop of blog posts for you to get your teeth into, including our Cybercrime Tactics…
Announcing Malwarebytes 3.0, a next-generation antivirus replacement
I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection…
AdGholas malvertising: business as usual
The largest malvertising attacks are the ones you seldom hear about. A group identified as AdGholas by Proofpoint which has been…
Malware taking advantage of Android OS exploits, again: Gooligan
From what we can gather from Check Point’s blog post, Gooligan is an already well-known threat with a new name hinted…