https://www.malwarebytes.com/blog/101/2018/11/trickbot-takes-top-business-threat
Nov 13, 2018 - There’s a newer, more sophisticated banking Trojan in town attempting to penetrate business networks and giving Emotet a run for its money. And its name is...
malwarebytes labstakestopbusinessthreat
https://www.malwarebytes.com/blog/news/2023/03/how-to-avoid-potentially-unwanted-programs
Mar 19, 2023 - If you’ve ever downloaded software onto your computer, chances are you’ve unknowingly cluttered your machine with potentially unwanted programs.
malwarebytes labsavoidpotentiallyunwantedprograms
https://www.malwarebytes.com/blog/101/2016/11/attribution-part-ii-dont-overthink-it
Nov 28, 2016 - In Part II of this three-part series, we take a deeper look into the mistakes one easily makes in terms of cyber attack attribution.
part iimalwarebytes labsattribution
https://www.malwarebytes.com/blog/101/2017/10/make-way-for-the-gdpr-is-your-business-ready
Oct 9, 2017 - On May 25th, 2018, the EU General Data Protection Regulation (GDPR) will come into full force. Where should B2Cs and B2Bs start? Read through our comprehensive...
make waygdprbusinessreadymalwarebytes
https://www.malwarebytes.com/blog/news/2016/06/explained-typosquatting
Jun 22, 2016 - Typosquatting is a term you may have seen when reading about Internet scams. In essence it relies on users making typing...
malwarebytes labsexplainedtyposquattingupdated
https://www.malwarebytes.com/blog/news/2017/06/new-mac-malware-as-a-service-offerings
Jun 13, 2017 - A couple weeks ago, two new Malware-as-a-Service (MaaS) offerings for the Mac became available. These two offerings - a backdoor named MacSpy and a ransomware...
malwarebytes labsnewmacserviceofferings
https://www.malwarebytes.com/blog/news/2016/05/fbi-announcement-paying-the-ransom-is-a-bad-idea
May 2, 2016 - Hey folks! So late last year, a quote was going around about a comment for the Special Agent in charge of...
bad ideafbiannouncementpayingransom
https://www.malwarebytes.com/blog/101/2017/12/internet-things-iot-security-never
Dec 5, 2017 - Internet of Things tech is incredibly popular. But security for these devices is practically non-existent. How do we secure IoT users now and in the future?
iot securityinternetthings
https://www.malwarebytes.com/blog/news/2018/09/how-to-protect-your-data-from-magecart-and-other-e-commerce-attacks
Sep 27, 2018 - Magecart and other criminal groups are causing mayhem by stealing payment information from e-commerce sites, big and small. Learn how they are doing it and how...
protectdata
https://www.malwarebytes.com/blog/news/2017/09/remediation-vs-prevention-how-to-place-your-bets
Sep 12, 2017 - Building a security environment for businesses is a gamble these days. It's remediation vs. prevention. Which should you bet on?
malwarebytes labsremediationvspreventionplace
https://www.malwarebytes.com/blog/news/2018/01/how-to-remove-adware-from-your-pc
Aug 29, 2024 - Half the battle in avoiding adware is reading EULAs carefully. But let's be real: no one does that. Here's how to remove adware from your PC.
malwarebytes labsremoveadwarepc
https://www.malwarebytes.com/blog/news/2017/01/understanding-the-basics-of-two-factor-authentication
Jan 19, 2017 - With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.
two factor authenticationmalwarebytes labsunderstandingbasics
https://www.malwarebytes.com/blog/news/2012/07/the-malware-that-i-used-to-know
Oct 4, 2023 - Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization...
malwarebytes labsusedknow
https://www.malwarebytes.com/blog/101/2016/10/attribution-and-when-you-should-care-part-1
Sep 27, 2023 - Attribution is the practice of taking forensic artifacts of a cyber attack and matching them to known threats against targets with a profile matching your...
malwarebytes labsattributioncarepart
https://www.malwarebytes.com/blog/news/2015/08/outbrowse-and-other-bundlers
Aug 13, 2015 - Bundlers are packages that install more than one program on a system. Some offer you a choice while others are less flexible and just go ahead. The Outbrowse...
malwarebytes labs
https://www.malwarebytes.com/blog/security-world/2017/09/infected-ccleaner-downloads-from-official-servers
Sep 17, 2017 - In a supply chain attack that may be unprecedented in number of downloads download servers hosting CCleaner, distributed by Avast have been delivering a...
malwarebytes labsupdatedinfectedccleanerdownloads
https://www.malwarebytes.com/blog/news/2017/10/using-ilspy-to-analyze-a-small-adware-file
Jan 13, 2026 - ILSpy is an open-source .NET assembly browser and decompiler. We demonstrate its use looking at a simple adware file.
malwarebytes labsusinganalyzesmalladware
https://www.malwarebytes.com/blog/news/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays
Jan 7, 2019 - Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions...
ransomware attacksmalwarebytes labsbusinessesholidays
https://www.malwarebytes.com/blog/detections/generic-malware-suspicious
Aug 16, 2023 - Generic.Malware/Suspicious is Malwarebytes' detection name given to files which trigger our generic criteria for suspicious files.
malwarebytes labsgenericsuspicious
https://www.malwarebytes.com/blog/news/2019/08/labs-quarterly-report-finds-ransomwares-gone-rampant-against-businesses
Aug 7, 2019 - This quarter, we noticed one threat dominating the landscape so much it deserved its own hard look. Ransomware's back in a big way.
quarterly reportlabsfindsransomwaregone
https://www.malwarebytes.com/blog/threats
Feb 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules
malwarebytes labsthreattypes
https://www.malwarebytes.com/blog/news/2017/06/petya-esque-ransomware-is-spreading-across-the-world
Jun 26, 2017 - Ringing in with echoes of WannaCry, Petya (or Petrwrap, NotPetya), is a new ransomware strain outbreak affecting many users around the world.
malwarebytes labspetyaesqueransomwarespreading
https://www.malwarebytes.com/blog/news/2016/03/fileless-infections-an-overview
Sep 26, 2023 - To date, there are a number of so-called fileless infections. By fileless infections or fileless malware, we are referring to an...
malwarebytes labsfilelessinfectionsoverview
https://www.malwarebytes.com/blog/101/2017/11/10-tips-safe-online-shopping-cyber-monday
Nov 16, 2017 - The Internet gets a little rough during the holiday shopping season. Here’s your guide to safe online shopping on Cyber Monday and beyond.
safe onlinecyber mondaytipsshoppingmalwarebytes
https://www.malwarebytes.com/blog/news/2017/07/the-state-of-ransomware-among-smbs
Jul 26, 2017 - Learn about the state of ransomware among SMBs and other critical security issues in a report conducted by Osterman Research and sponsored by Malwarebytes.
malwarebytes labsstateransomwareamongsmbs
https://www.malwarebytes.com/blog/news/2018/01/scarab-ransomware-new-variant-changes-tactics
Jan 13, 2026 - The Scarab ransomware was discovered in June 2017. Since then, several variants have been created and discovered in the wild. The...
malwarebytes labsransomwarenewvariantchanges
https://www.malwarebytes.com/blog/news/2014/02/a-look-at-malware-with-virtual-machine-detection
Jan 16, 2026 - Due to heavy reliance on Virtual Machines for malware analysis, it's not uncommon for the malware of today to include some type of built-in virtual...
virtual machinemalwarebytes labslookdetection
https://www.malwarebytes.com/blog/news/2018/02/how-to-protect-your-computer-from-malicious-cryptomining
Aug 29, 2024 - When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again?
malwarebytes labsprotectcomputermaliciouscryptomining
https://www.malwarebytes.com/blog/101/2018/02/stop-telephoning-me-robocalls-explained
Aug 29, 2024 - The FCC has identified robocalls as the number one complaint from the public. In this post, we tell you what to do to protect against them.
stopehrobocallsexplainedmalwarebytes
https://www.malwarebytes.com/blog/101/2017/06/somethings-phishy-how-to-detect-phishing-attempts
Jun 25, 2017 - Phishing has evolved from the days of the Nigerian prince, taking on many forms and mediums. Learn how to detect today's sophisticated phishing attempts.
somethingdetectphishingattemptsmalwarebytes
https://www.malwarebytes.com/blog/news/2018/05/samsam-ransomware-need-know
Sep 29, 2023 - SamSam ransomware is a custom infection used in targeted attacks, often deployed using a wide range of exploits or brute-force tactics. Based...
malwarebytes labssamsamransomwareneedknow
https://www.malwarebytes.com/blog/news/2018/07/when-three-isnt-a-crowd-man-in-the-middle-mitm-attacks-explained
Jul 11, 2018 - Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to...
threecrowdman
https://www.malwarebytes.com/blog/news/2013/11/stuxnet-new-light-through-old-windows
Jan 16, 2026 - A lesser known (and almost bypassed) version of Stuxnet shines new light on its attackers intentions and cyber arm capabilities.
malwarebytes labsstuxnetnewlightold
https://www.malwarebytes.com/blog/news/2020/07/mac-thiefquest-malware-may-not-be-ransomware-after-all
Jul 6, 2020 - We discovered a new Mac malware, ThiefQuest, that appeared to be ransomware at first glance. However, once we dug in deeper, we found out its true identity.
macmalwaremayransomware
https://www.malwarebytes.com/blog/news/2018/03/the-state-of-mac-malware
Aug 29, 2024 - Mac users are often told that there are no Mac viruses. In reality, Mac malware does exist, as we'll see in this summary of 2018 Mac threats, our State of...
malwarebytes labsstatemac
https://www.malwarebytes.com/blog/news/2013/10/cryptolocker-ransomware-what-you-need-to-know
Oct 7, 2013 - Cryptolocker is a nasty ransomware that encrypts infected users' personal files. Using Malwarebytes Premium will keep you safe.
malwarebytes labsransomwareneedknow
https://www.malwarebytes.com/blog/news/2017/11/cryptocurrency-works-cybercriminals-love
Nov 2, 2017 - Ever stumble into a conversation about Bitcoin and wonder, "What is cryptocurrency, anyway?" Read on to learn how it works and why cybercriminals...
cryptocurrencycybercriminalslovemalwarebytes
https://www.malwarebytes.com/blog/news/2016/06/truth-in-malvertising-how-to-beat-bad-ads
Jun 12, 2016 - One of the basic tenants of cybersecurity is user awareness. If you practice safe browsing habits, you can protect yourself. Unfortunately, malvertising is a...
malwarebytes labstruthmalvertisingbeatbad
https://www.malwarebytes.com/blog/news/2019/08/unprecedented-new-iphone-malware-discovered
Aug 29, 2019 - Google announced late last night that hacked websites have been used to drop iPhone malware on unsuspecting users over a two-year period.
new iphonemalwarebytes labsunprecedenteddiscovered
https://www.malwarebytes.com/blog/news/2014/12/irs-phone-scammers-double-up-their-efforts-for-the-holidays
Jan 16, 2026 - It might not be tax season yet but Internal Revenue Service impersonators are hard at work scamming people this holiday season.
irsphonescammersdoubleefforts
https://www.malwarebytes.com/blog/news/2017/12/lo-lo-lo-lo-loapi-we-have-you-protected
Dec 18, 2017 - Loapi Trojan discovered on Android devices could literally blow up your phone. Read on to learn how to protect against it.
lotrojancouldbreakandroid
https://www.malwarebytes.com/blog/news/2020/01/spear-phishing-101-what-you-need-to-know
Jan 28, 2020 - We look at the threat of spear phishing, why it's such a problem, and what organizations can do to lessen the chance of a successful attack.
spear phishingmalwarebytes labsneedknow
https://www.malwarebytes.com/blog/detections/bootkit
Oct 1, 2025 - A bootkit is a type of malicious infection which targets the Master Boot Record located on the physical motherboard of the computer.
malwarebytes labs
https://www.malwarebytes.com/blog/news/malware/2017/03/explained-packer-crypter-and-protector
Nov 8, 2024 - In this article we will try to explain the terms packer, crypter, and protector in the context of how they are used in malware.
malwarebytes labsexplainedpackerprotector
https://www.malwarebytes.com/blog/news/2018/05/tech-support-scam-blacklist-go
May 10, 2018 - For about five years, we’ve maintained a blacklist of recognized tech support scammers, along with websites and phone numbers they might...
tech supportmalwarebytes labsscamblacklistgo
https://www.malwarebytes.com/blog/security-world/2017/02/dnssec-why-do-we-need-it
Feb 26, 2017 - We take a look at what DNSSEC is and why we need it. Plus an overview of how far the implementation has progressed in the Netherlands based on a SIDN report.
malwarebytes labsdnssecneed
https://www.malwarebytes.com/blog/101/2017/05/dont-need-27-different-passwords
May 3, 2017 - You have to remember 27 different passwords—and you can't write them down. No longer. Now you can protect your data and your sanity with much less...
needdifferentpasswordsmalwarebytes
https://www.malwarebytes.com/blog/news/2014/03/malware-found-in-google-play-store
Mar 11, 2014 - Two malware disguised as apps found in the Google Play Store.
google play storemalwarebytes labsfound
https://www.malwarebytes.com/blog/news/2013/03/obfuscation-malwares-best-friend
Jan 16, 2026 - Phishing, what is phishing, internet security, computers, laptops, antivirus, anti virus, malware, anti malware, antimalware, spyware removal, remove spyware,...
best friendmalwarebytes labsobfuscation
https://www.malwarebytes.com/blog/news/2015/06/when-trolls-come-in-a-three-piece-suit
Sep 17, 2025 - We looked into trolling and how trolls have evolved these past few years, rising above mischief to doing it for a living and a cause.
malwarebytes labstrollscomethreepiece
https://www.malwarebytes.com/blog/news/2018/03/how-artificial-intelligence-and-machine-learning-will-impact-cybersecurity
Aug 29, 2024 - Both artificial intelligence and machine learning are being adopted in cybersecurity. But before they achieve mainstream traction, it's important to...
artificial intelligencemachine learningimpactcybersecuritymalwarebytes
https://www.malwarebytes.com/blog/news/2013/02/sandbox-sensitivity
Feb 4, 2013 - This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid their code to run on them.
malwarebytes labssandboxsensitivity
https://www.malwarebytes.com/blog/news/2020/04/the-passwordless-present-will-biometrics-replace-passwords-forever
Apr 20, 2020 - With their effectiveness in question, many call for the end of passwords, instead pushing for biometrics to replace them. But are they really more secure?
malwarebytes labspasswordlesspresentbiometricsreplace
https://www.malwarebytes.com/blog/news/malware/2016/07/explained-advanced-persistent-threat-apt
Jul 25, 2016 - An advanced persistent threat (APT) is a prolonged, aimed attack on a specific target with the intention to compromise their system...
malwarebytes labsexplainedadvancedpersistentthreat
https://www.malwarebytes.com/blog/news/2014/05/tails-the-amnesic-incognito-live-system
May 25, 2014 - Tails is a Live CD Linux distribution geared towards preserving privacy, anonymity and circumventing censorship.
malwarebytes labstailsincognitolivesystem
https://www.malwarebytes.com/blog/news/2016/09/top-10-ways-to-secure-your-mobile-phone
Sep 20, 2016 - To get a leg up against a rising tide of mobile malware activity, don't just phone it in—secure your mobile phone with these tried and true methods.
mobile phonemalwarebytes labstopwayssecure
https://www.malwarebytes.com/blog/news/2018/03/you-down-with-p2p-10-tips-to-secure-your-mobile-payment-app
Aug 29, 2024 - Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we'll look at the...
tipssecuremobile
https://www.malwarebytes.com/blog/news/2016/03/how-to-beat-ransomware-prevent-dont-react
Mar 10, 2016 - The best way to stop ransomware attacks is to prevent them from ever happening in the first place. We can tell you how to beat ransomware at its own game.
beatransomwarepreventreactmalwarebytes
https://www.malwarebytes.com/blog/news/2016/05/how-to-tell-if-youre-infected-with-malware
Oct 12, 2023 - Sometimes a malware infection is plain as day. Other times it's a silent killer. If you want to know whether or not your machine is sick, you first need...
tellinfectedmalware
https://www.malwarebytes.com/blog/news/2017/01/zbot-with-legitimate-applications-on-board
Jan 14, 2026 - In this post we will have a look at the features and internals of the Zbot malware.
malwarebytes labslegitimateapplicationsboard
https://www.malwarebytes.com/blog/news/2017/06/a-week-in-security-jun-05-jun-11
Jun 11, 2017 - A compilation of notable security news and blog posts from the 5th of June to the 11th.
weeksecurityjunmalwarebytes
https://www.malwarebytes.com/blog/news/2017/12/children-and-young-adults-the-next-generation-money-mules
Dec 4, 2017 - Money laundering predates the Internet. But today's interconnectedness has made it a lot easier for criminals to lure unsuspecting users into becoming...
young adultsnext generationmoney muleschildrenmalwarebytes
https://www.malwarebytes.com/blog/news/2014/01/revealed-pos-malware-used-in-target-attack
Jan 15, 2014 - Malicious software used during the Target credit card attacks has been identified as a well-known POS ram scraper malware.
malwarebytes labsrevealedposusedtarget
https://www.malwarebytes.com/blog/news/2014/10/changes-in-the-lsp-stack
Oct 12, 2014 - Windows LSP stack is basically a set of dll’s that can monitor, filter and alter the data coming in through your internet connection. Unwanted elements can...
malwarebytes labschangeslspstack
https://www.malwarebytes.com/blog/news/2015/09/dns-hijacks-what-to-look-for
Sep 15, 2015 - DNS name resolution. What is it? How does it work? And how can it be altered by malware?
malwarebytes labsdnslook
https://www.malwarebytes.com/blog/101/2015/02/what-is-malvertising
Feb 23, 2015 - We’re on an educational push here at Malwarebytes with the aim of helping users become a bit more aware of the latest tricks criminals are using. Today,...
malwarebytes labsmalvertising
https://www.malwarebytes.com/blog/news/2017/11/new-trojan-malware-discovered-google-play
Sep 26, 2023 - New Android Trojan malware has been found in Google Play masquerading as multiple apps. We call this malware Android/Trojan.AsiaHitGroup.
trojan malwaregoogle playmalwarebytes labsnewandroid
https://www.malwarebytes.com/blog/news/2016/03/first-mac-ransomware-spotted
Mar 6, 2016 - Palo Alto Networks has discovered the first Mac ransomware, called KeRanger, which was found infecting the Transmission BitTorrent client.
malwarebytes labsfirstmacransomwarespotted
https://www.malwarebytes.com/blog/news/2017/03/mac-security-facts-and-fallacies
Mar 7, 2017 - There are many Mac security myths circulating among users. So how can you tell if the advice you’re reading is fact or fallacy? Read on to find out!
mac securitymalwarebytes labsfacts
https://www.malwarebytes.com/blog/news/2018/02/drive-by-cryptomining-campaign-attracts-millions-of-android-users
Jan 13, 2026 - Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far.
android usersdrivecryptominingcampaigntargets
https://www.malwarebytes.com/blog/news/2016/04/how-to-protect-your-business-from-ransomware
Apr 11, 2016 - Ransomware is as pervasive as it is dangerous. Learn how to protect your business from ransomware with this infographic.
malwarebytes labsprotectbusinessransomware
https://www.malwarebytes.com/blog/101/2018/01/cookies-should-i-worry-about-them
Aug 29, 2024 - Are cookies a threat? The answer depends on how much you care about privacy. Learn how to manage cookies and stay in control of your data.
malwarebytes labscookiesworry
https://www.malwarebytes.com/blog/101/2017/10/out-of-character-homograph-attacks-explained
Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most...
malwarebytes labscharacterattacksexplained
https://www.malwarebytes.com/blog/news/2016/06/malvertising-and-ransomware-the-bonnie-and-clyde-of-advanced-threats
Jun 21, 2016 - Malvertising and ransomware. A match made in hell. In this infographic, you'll learn about what businesses can do to protect against these two advanced...
malvertisingransomwarebonnieclydeadvanced