Robuta

Sponsor of the Day: Jerkmate
https://www.malwarebytes.com/blog/news/2017/09/remediation-vs-prevention-how-to-place-your-bets Remediation vs. prevention: How to place your bets | Malwarebytes Labs Building a security environment for businesses is a gamble these days. It's remediation vs. prevention. Which should you bet on? malwarebytes labsremediationvspreventionplace https://www.malwarebytes.com/blog/authors/malwarebyteslabs Malwarebytes Labs | Malwarebytes Labs malwarebytes labs https://www.malwarebytes.com/blog/threats/remote-access-trojan-rat?x-clickref=1101lDeHHr9c Remote Access Trojan (RAT) | RAT Malware | RAT Trojans | Malwarebytes Labs remote access trojanmalwarebytes labsrattrojans https://www.malwarebytes.com/blog/news/2017/10/using-ilspy-to-analyze-a-small-adware-file Using ILSpy to analyze a small adware file | Malwarebytes Labs Jan 13, 2026 - ILSpy is an open-source .NET assembly browser and decompiler. We demonstrate its use looking at a simple adware file. malwarebytes labsusinganalyzesmalladware https://www.malwarebytes.com/blog/category/mobile Mobile | Malwarebytes Labs Recent Malwarebytes articles about mobile threats malwarebytes labsmobile https://www.malwarebytes.com/blog/news/2018/03/the-state-of-mac-malware The state of Mac malware | Malwarebytes Labs Aug 29, 2024 - Mac users are often told that there are no Mac viruses. In reality, Mac malware does exist, as we'll see in this summary of 2018 Mac threats, our State of Mac... mac malwaremalwarebytes labsstate https://www.malwarebytes.com/blog/news/2016/11/ransomware-doesnt-mean-game-over Ransomware doesn’t mean game over | Malwarebytes Labs Over the course of just a few years, ransomware has evolved from an annoying pop-up to a sophisticated malicious program that encrypts important files. malwarebytes labsransomwaremeangame https://www.malwarebytes.com/pt-br/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/blog/news/2017/11/a-look-into-the-global-drive-by-cryptocurrency-mining-phenomenon A look into the global drive-by cryptocurrency mining phenomenon | Malwarebytes Labs Dec 3, 2025 - As drive-by downloads slow down, drive-by cryptocurrency mining emerges as the latest annoyance that hijacks our PCs' CPU. cryptocurrency miningmalwarebytes labslookglobaldrive https://www.malwarebytes.com/blog/news/2023/03/how-to-avoid-potentially-unwanted-programs How to avoid potentially unwanted programs | Malwarebytes Labs If you’ve ever downloaded software onto your computer, chances are you’ve unknowingly cluttered your machine with potentially unwanted programs. malwarebytes labsavoidpotentiallyunwantedprograms https://www.malwarebytes.com/blog/business/2019/12/5-tips-for-building-an-effective-security-operations-center-soc 5 tips for building an effective security operations center (SOC) | Malwarebytes Labs Dec 3, 2025 - A security operations center (SOC) can significantly improve an organization's security posture, but it's not a perfect solution and can be challenging to... security operations center5 tipsmalwarebytes labsbuildingeffective https://www.malwarebytes.com/blog/news/2017/12/children-and-young-adults-the-next-generation-money-mules Children and young adults: the next-generation money mules | Malwarebytes Labs Feb 3, 2026 - Money laundering predates the Internet. But today's interconnectedness has made it a lot easier for criminals to lure unsuspecting users into becoming money... young adultsnext generationmoney mulesmalwarebytes labschildren https://www.malwarebytes.com/nl/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/news/2017/11/cryptocurrency-works-cybercriminals-love What is cryptocurrency and why do cybercriminals love it? | Malwarebytes Labs Ever stumble into a conversation about Bitcoin and wonder, malwarebytes labscryptocurrencycybercriminalslove https://www.malwarebytes.com/blog/news/2019/01/ryuk-ransomware-attacks-businesses-over-the-holidays Ryuk ransomware attacks businesses over the holidays | Malwarebytes Labs Feb 3, 2026 - Over the holiday, a little-known ransomware family called Ryuk caused serious damage to numerous organizations. The attacks leave a lot of questions... ryuk ransomwaremalwarebytes labsattacksbusinessesholidays https://www.malwarebytes.com/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/news/malware/2017/03/explained-packer-crypter-and-protector Explained: Packer, Crypter, and Protector | Malwarebytes Labs Feb 3, 2026 - In this article we will try to explain the terms packer, crypter, and protector in the context of how they are used in malware. malwarebytes labsexplainedpackercrypterprotector https://www.malwarebytes.com/blog/news/2016/06/petya-and-mischa-ransomware-duet-p2 Petya and Mischa: ransomware duet (part 2) | Malwarebytes Labs Jan 15, 2026 - After being defeated in April, Petya comes back with new tricks. Now, not as a single ransomware, but in a bundle... part 2malwarebytes labspetyamischaransomware https://www.malwarebytes.com/blog/news/2020/04/the-passwordless-present-will-biometrics-replace-passwords-forever The passwordless present: Will biometrics replace passwords forever? | Malwarebytes Labs With their effectiveness in question, many call for the end of passwords, instead pushing for biometrics to replace them. But are they really more secure? malwarebytes labspasswordlesspresentbiometricsreplace https://www.malwarebytes.com/blog/101/2017/10/make-way-for-the-gdpr-is-your-business-ready Make way for the GDPR: Is your business ready? | Malwarebytes Labs On May 25th, 2018, the EU General Data Protection Regulation (GDPR) will come into full force. Where should B2Cs and B2Bs start? Read through our comprehensive... make waybusiness readymalwarebytes labsgdpr https://www.malwarebytes.com/blog/detection/pup PUP | Malwarebytes Labs A list of PUP detections malwarebytes labspup https://www.malwarebytes.com/blog/news/2015/02/the-facts-about-botnets The Facts about Botnets | Malwarebytes Labs Feb 3, 2026 - Botnets were used to take down Xbox and Playstation's network during the holidays. But did you know that botnets were originally designed to be helpful? malwarebytes labsfactsbotnets https://www.malwarebytes.com/blog/news/2020/01/spear-phishing-101-what-you-need-to-know Spear phishing 101: what you need to know | Malwarebytes Labs We look at the threat of spear phishing, why it's such a problem, and what organizations can do to lessen the chance of a successful attack. spear phishingmalwarebytes labs101needknow https://www.malwarebytes.com/blog/news/2016/03/first-mac-ransomware-spotted First Mac ransomware spotted | Malwarebytes Labs Feb 3, 2026 - Palo Alto Networks has discovered the first Mac ransomware, called KeRanger, which was found infecting the Transmission BitTorrent client. malwarebytes labsfirstmacransomwarespotted https://www.malwarebytes.com/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/blog/news/2017/01/zbot-with-legitimate-applications-on-board Zbot with legitimate applications on board | Malwarebytes Labs Feb 3, 2026 - In this post we will have a look at the features and internals of the Zbot malware. malwarebytes labslegitimateapplicationsboard https://www.malwarebytes.com/blog/news/2017/03/adware-vs-ad-fraud Adware vs. ad fraud | Malwarebytes Labs Feb 3, 2026 - We explain what adware and ad-fraud are and point out the differences by discussing the methods and the classification of the malware that is involved. ad fraudmalwarebytes labsadwarevs https://www.malwarebytes.com/blog/security-world/2018/03/how-artificial-intelligence-and-machine-learning-will-impact-cybersecurity How artificial intelligence and machine learning will impact cybersecurity | Malwarebytes Labs Aug 29, 2024 - Both artificial intelligence and machine learning are being adopted in cybersecurity. But before they achieve mainstream traction, it's important to discuss... artificial intelligencemachine learningimpact cybersecuritymalwarebytes labs https://www.malwarebytes.com/blog/101/2017/05/dont-need-27-different-passwords Why you don't need 27 different passwords | Malwarebytes Labs You have to remember 27 different passwords—and you can't write them down. No longer. Now you can protect your data and your sanity with much less effort. malwarebytes labsneed27differentpasswords https://www.malwarebytes.com/ja/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/blog/101/2017/01/understanding-the-basics-of-two-factor-authentication Understanding the basics of two-factor authentication | Malwarebytes Labs With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit. two factor authenticationmalwarebytes labsunderstandingbasics https://www.malwarebytes.com/blog/news/2018/01/scarab-ransomware-new-variant-changes-tactics Scarab ransomware: new variant changes tactics | Malwarebytes Labs Jan 13, 2026 - The Scarab ransomware was discovered in June 2017. Since then, several variants have been created and discovered in the wild. The... new variantmalwarebytes labsscarabransomwarechanges https://www.malwarebytes.com/de/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/fr/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/pl/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/es/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/news/2017/09/drive-by-mining-and-ads-the-wild-wild-west Drive-by mining and ads: The Wild Wild West | Malwarebytes Labs Jan 13, 2026 - Cryptomining in the browser is all the rage lately. But what are the impacts for users when it is being abused by dubious publishers? wild westmalwarebytes labsdriveminingads https://www.malwarebytes.com/blog/page/2?s=apple Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 8, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/news/2018/02/drive-by-cryptomining-campaign-attracts-millions-of-android-users Drive-by cryptomining campaign targets millions of Android users | Malwarebytes Labs Jan 13, 2026 - Android users have been exposed to drive-by cryptomining in one of the largest campaigns that we have detected so far. campaign targetsandroid usersmalwarebytes labsdrivecryptomining https://www.malwarebytes.com/blog/threats/dns-hijacker DNS hijacker | Malwarebytes Labs Oct 30, 2023 - DNS changers/hijackers are Trojans crafted to modify infected systems' DNS settings without the users' knowledge or consent malwarebytes labsdnshijacker https://www.malwarebytes.com/blog/news/2018/01/how-to-remove-adware-from-your-pc How to remove adware from your PC | Malwarebytes Labs Aug 29, 2024 - Half the battle in avoiding adware is reading EULAs carefully. But let's be real: no one does that. Here's how to remove adware from your PC. malwarebytes labsremoveadwarepc https://www.malwarebytes.com/blog/news/2017/12/lo-lo-lo-lo-loapi-we-have-you-protected Lo lo lo Loapi Trojan could break your Android | Malwarebytes Labs Feb 3, 2026 - Loapi Trojan discovered on Android devices could literally blow up your phone. Read on to learn how to protect against it. could breakmalwarebytes labslotrojanandroid https://www.malwarebytes.com/blog/authors/dbradbury Danny Bradbury | Malwarebytes Labs malwarebytes labsdannybradbury https://www.malwarebytes.com/blog/news/2013/09/encryption-types-of-secure-communication-and-storage Encryption: types of secure communication and storage | Malwarebytes Labs Feb 3, 2026 - Security is, or should be, a major concern on the internet, learn how encryption keeps your sensitive info safe. encryption typessecure communicationmalwarebytes labsstorage https://www.malwarebytes.com/blog/news/2016/05/tech-support-scams Tech support scams: help and resource page | Malwarebytes Labs Sep 26, 2023 - We've gathered all the information we've collected over time on tech support scams into one place you can use as a go-to resource on how tech support scams... tech support scamsmalwarebytes labshelpresource https://www.malwarebytes.com/blog/detections/adware-newtab Adware.NewTab | Malwarebytes Labs Oct 27, 2023 - Adware.NewTab is a browser extension or application that pretends to be a tracker for packages or flights, but offers advertisements. malwarebytes labsadware https://www.malwarebytes.com/blog/news/2019/05/nists-privacy-framework-lets-privacy-tell-its-own-story NIST's privacy framework lets privacy tell its own story | Malwarebytes Labs The US National Institute of Standards and Technology (NIST) is trying to craft a voluntary path towards better user privacy with what it calls a “privacy... privacy frameworkmalwarebytes labsnistletstell https://www.malwarebytes.com/de/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/threats/rootkits Rootkits | Malwarebytes Labs Oct 30, 2023 - A rootkit is software that allows for stealthy presence of unauthorized functionality in the system malwarebytes labsrootkits https://www.malwarebytes.com/blog/authors/gorini Gabriele Orini | Malwarebytes Labs malwarebytes labsgabriele https://www.malwarebytes.com/blog/security-world/2017/12/how-cryptocurrency-mining-works-bitcoin-vs-monero How cryptocurrency mining works: Bitcoin vs. Monero | Malwarebytes Labs Why threat actors prefer mining for Monero rather than for the very hot Bitcoin cryptocurrency? Let us point out some possible reasons. cryptocurrency miningbitcoin vsmalwarebytes labsworksmonero https://www.malwarebytes.com/blog/news/2016/06/truth-in-malvertising-how-to-beat-bad-ads Truth in malvertising: How to beat bad ads | Malwarebytes Labs One of the basic tenants of cybersecurity is user awareness. If you practice safe browsing habits, you can protect yourself. Unfortunately, malvertising is a... bad adsmalwarebytes labstruthmalvertisingbeat https://www.malwarebytes.com/blog/news/2017/02/decrypting-after-a-findzip-ransomware-infection Decrypting after a Findzip ransomware infection | Malwarebytes Labs Feb 3, 2026 - At the time, Findzip ransomware was thought to be irreversible. Turns out, that's not quite true. malwarebytes labsdecryptingransomwareinfection https://www.malwarebytes.com/blog/news/2018/05/tech-support-scam-blacklist-go Where did the tech support scam blacklist go? | Malwarebytes Labs For about five years, we’ve maintained a blacklist of recognized tech support scammers, along with websites and phone numbers they might... tech support scammalwarebytes labsblacklistgo https://www.malwarebytes.com/blog/security-world/2017/09/infected-ccleaner-downloads-from-official-servers [Updated] Infected CCleaner downloads from official servers | Malwarebytes Labs In a supply chain attack that may be unprecedented in number of downloads download servers hosting CCleaner, distributed by Avast have been delivering a... malwarebytes labsupdatedinfectedccleanerdownloads https://www.malwarebytes.com/blog/news/2013/09/in-computers-are-random-numbers-really-random In computers, are random numbers really random? | Malwarebytes Labs Feb 3, 2026 - Computers do not work easily with truly random numbers and it pays off to understand how pseudo-random numbers are used and created. random numbersmalwarebytes labscomputersreally https://www.malwarebytes.com/blog/101/2015/02/what-is-malvertising What is malvertising? | Malwarebytes Labs We’re on an educational push here at Malwarebytes with the aim of helping users become a bit more aware of the latest tricks criminals are using. Today, we're... malwarebytes labsmalvertising https://www.malwarebytes.com/blog/news/2018/08/social-engineering-attacks-what-makes-you-susceptible Social engineering attacks: What makes you susceptible? | Malwarebytes Labs Feb 3, 2026 - Cybercriminals will do what it takes to get what they want, whether that's breaching a corporate network or stealing credentials with malware. But what do we... social engineering attacksmalwarebytes labsmakessusceptible https://www.malwarebytes.com/blog/101/2014/09/meet-the-master-boot-record Meet the Master Boot Record | Malwarebytes Labs What is MBR and how does malware affect it? MBR is short for Master Boot Record. Typically, the MBR is the first sector on a startup drive (or other... master boot recordmalwarebytes labsmeet https://www.malwarebytes.com/blog/news/2015/09/dns-hijacks-what-to-look-for DNS hijacks: what to look for | Malwarebytes Labs Feb 3, 2026 - DNS name resolution. What is it? How does it work? And how can it be altered by malware? malwarebytes labsdnshijackslook https://www.malwarebytes.com/blog/detection/malware Malware | Malwarebytes Labs A list of malware detections malware malwarebyteslabs https://www.malwarebytes.com/blog/authors/metallicamvp Pieter Arntz | Malwarebytes Labs malwarebytes labspieterarntz https://www.malwarebytes.com/blog/news/2017/10/magniber-ransomware-exclusively-for-south-koreans Magniber ransomware: exclusively for South Koreans | Malwarebytes Labs Jan 13, 2026 - A few days ago, Magnitude EK resurfaced, this time with a new payload that targets only the country of South Korea. It's called Magniber ransomware. south koreansmalwarebytes labsransomwareexclusively https://www.malwarebytes.com/blog/news/2018/03/you-down-with-p2p-10-tips-to-secure-your-mobile-payment-app You down with P2P? 10 tips to secure your mobile payment app | Malwarebytes Labs Aug 29, 2024 - Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we'll look at the... mobile payment app10 tipsmalwarebytes labsp2psecure https://www.malwarebytes.com/ja/blog?s=apple Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 8, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/101/2017/06/somethings-phishy-how-to-detect-phishing-attempts Something's phishy: How to detect phishing attempts | Malwarebytes Labs Phishing has evolved from the days of the Nigerian prince, taking on many forms and mediums. Learn how to detect today's sophisticated phishing attempts. detect phishingmalwarebytes labssomethingphishyattempts https://www.malwarebytes.com/pt-br/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog/101/2018/02/stop-telephoning-me-robocalls-explained Stop telephoning me-eh-eh-eh-eh: robocalls explained | Malwarebytes Labs Aug 29, 2024 - The FCC has identified robocalls as the number one complaint from the public. In this post, we tell you what to do to protect against them. malwarebytes labsstopehrobocallsexplained https://www.malwarebytes.com/blog/101/2017/12/internet-things-iot-security-never Internet of Things (IoT) security: what is and what should never be | Malwarebytes Labs Feb 3, 2026 - Internet of Things tech is incredibly popular. But security for these devices is practically non-existent. How do we secure IoT users now and in the future? things iotmalwarebytes labsinternetsecuritynever https://www.malwarebytes.com/pt/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/fr/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/ru/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/nl/blog/threats Threat Types | Malwarebytes Labs Apr 1, 2026 - Monthly top 10 lists of malware blocked by Malwarebytes Protection modules threat types malwarebyteslabs https://www.malwarebytes.com/blog/news/2018/02/how-to-protect-your-computer-from-malicious-cryptomining How to protect your computer from malicious cryptomining | Malwarebytes Labs Aug 29, 2024 - When you experience a slow computer due to malicious cryptomining, how can you troubleshoot it and prevent it from happening again? malwarebytes labsprotectcomputermaliciouscryptomining https://www.malwarebytes.com/blog/news/2019/08/unprecedented-new-iphone-malware-discovered Unprecedented new iPhone malware discovered | Malwarebytes Labs Google announced late last night that hacked websites have been used to drop iPhone malware on unsuspecting users over a two-year period. unprecedented newmalwarebytes labsiphonediscovered https://www.malwarebytes.com/blog/news/2014/12/irs-phone-scammers-double-up-their-efforts-for-the-holidays IRS phone scammers double up their efforts for the holidays | Malwarebytes Labs Jan 16, 2026 - It might not be tax season yet but Internal Revenue Service impersonators are hard at work scamming people this holiday season. phone scammersmalwarebytes labsirsdoubleefforts https://www.malwarebytes.com/blog/security-world/2018/03/graykey-iphone-unlocker-poses-serious-security-concerns GrayKey iPhone unlocker poses serious security concerns | Malwarebytes Labs Aug 29, 2024 - Ever since the case of the San Bernadino shooter pitted Apple against the FBI over the unlocking of an iPhone, opinions... iphone unlockerposes serioussecurity concernsmalwarebytes labs https://www.malwarebytes.com/blog/news/2017/06/petya-esque-ransomware-is-spreading-across-the-world Petya-esque ransomware is spreading across the world | Malwarebytes Labs Feb 3, 2026 - Ringing in with echoes of WannaCry, Petya (or Petrwrap, NotPetya), is a new ransomware strain outbreak affecting many users around the world. spreading acrossmalwarebytes labspetyaesqueransomware https://www.malwarebytes.com/blog/news/2016/09/top-10-ways-to-secure-your-mobile-phone Top 10 ways to secure your mobile phone | Malwarebytes Labs To get a leg up against a rising tide of mobile malware activity, don't just phone it in—secure your mobile phone with these tried and true methods. top 10 waysmobile phonemalwarebytes labssecure https://www.malwarebytes.com/blog/threats/malspam Malspam | Malwarebytes Labs Oct 30, 2023 - Malspam is the term used to designate malware that is delivered via email messages. malwarebytes labs https://www.malwarebytes.com/blog/101/2017/10/out-of-character-homograph-attacks-explained Out of character: Homograph attacks explained | Malwarebytes Labs Online and on traditional media, we hear and read about different kinds of cybersecurity attacks that sometimes we get overwhelmed with the terminologies. Most... attacks explainedmalwarebytes labscharacterhomograph https://www.malwarebytes.com/pl/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/blog?s=apple Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 2, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog https://www.malwarebytes.com/it/blog Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs Apr 24, 2026 - The Security Blog From Malwarebytes malwarebytes labssecurity blog