Profile

Cover photo
Verified name
16,773 followers|6,627,209 views
AboutPostsYouTube

Stream

Malwarebytes

Shared publicly  - 
 
We've covered the Neutrino and Magnitude exploit kits. Now we take a look at number #3, RIG EK and the different distribution paths using packet captures collected by our honeypot.
We've covered the Neutrino and Magnitude exploit kits. Now we take a look at number #3, RIG EK and the different distribution paths using packet captures collected by our honeypot. The campaigns for distribution involve malvertising and compromised sites (much like all other EKs) but there is a notable diversity in how many different ways RIG EK is being loaded and the type of payloads it is serving.
6
Add a comment...

Malwarebytes

Shared publicly  - 
 
An Advanced Persistent Threat (APT) is a prolonged, aimed attack on a specific target with the intention to compromise their system and gain information from or about that target. The target can be a person, an organization or a business.
An Advanced Persistent Threat (APT) is a prolonged, aimed attack on a specific target with the intention to compromise their system and gain information from or about that target. The target can be a person, an organization or a business.
10
1
Add a comment...

Malwarebytes

Shared publicly  - 
 
A compilation of notable security news and blog posts from July 17th to July 23rd. This week, we talk about tech support scams, Winrange, and the Mac malware, Adwind.
A compilation of notable security news and blog posts from July 17th to July 23rd. This week, we talk about tech support scams, Winrange, and the Mac malware, Adwind.
8
1
Add a comment...

Malwarebytes

Shared publicly  - 
 
We examine a cross-platform malware with a Mac payload and found the hackers behind it really didn't put that much effort into making it work on the Mac.
We examine a cross-platform malware with a Mac payload and found the hackers behind it really didn't put that much effort into making it work on the Mac.
12
6
Add a comment...

Malwarebytes

Shared publicly  - 
 
Why are these fake Malwarebytes tech support still in business? Here are a few of the structural forces that sometimes prevent us from smiting scammers for great justice. Read more at https://blog.malwarebytes.com/threat-analysis/2016/07/online-scams-why-havent-we-won-yet/?utm_source=linkedin&utm_medium=social
Why are these fake Malwarebytes tech support still in business? Here are a few of the structural forces that sometimes prevent us from smiting scammers for great justice.
16
3
Lynn Terry's profile photo
 
I use malwarebytes?!? 
Add a comment...

Malwarebytes

Shared publicly  - 
 
We can't wait for #NASCAR this Sunday & see the newly wrapped Malwarebytes car! https://youtu.be/DSI8EG9CflQ
13
1
Add a comment...
In their circles
138 people
Have them in circles
16,773 people
Justin Lawrence's profile photo
Amir Firdaus Shuhaimi's profile photo
DENNIS MATHEW's profile photo
David Hannah's profile photo
Richard Knowles's profile photo
Iliyan Vasilareas's profile photo
Mooshy Amy (Moshi)'s profile photo
Wilfrid Bouchet's profile photo
Scott Basso's profile photo

Malwarebytes

Shared publicly  - 
 
Hackers have stolen billions of dollars from American companies by impersonating CEOs in an email scam -- and the loot gets wired to banks in China and Hong Kong 83% of the time.
The vast majority money stolen by hackers in "business email compromise" scams goes to banks in China and Hong Kong, according to the FBI.
13
6
Add a comment...

Malwarebytes

Shared publicly  - 
 
Cyber-criminals are getting smarter and have more tools to lure in unwary consumers. Here are some of the most popular methods—and ways to stay safe.
Cyber-criminals are getting smarter and have more tools to lure in unwary consumers. Here are some of the most popular methods—and ways to stay safe.
13
8
Grayson Peddie's profile photo
 
And it's up to businesses, large and small, to be smarter than criminals. Authentic criminals. :)
Add a comment...

Malwarebytes

Shared publicly  - 
 
"Its targets of opportunity could mean your grandma or grandpa, or a corporation down the street, such as a health-care provider," said Will Bales, a Chantilly, Va.-based FBI supervisory special agent in charge of ransomware probes.
Days before a big race, a Nascar team had its critical computer files held for ransom. The team is not alone, as thousands of victims have been reported.
12
3
Matt Lewis's profile photoBert Knabe's profile photo
2 comments
 
Yeah, but restores aren't instantaneous. better to have the backup and never have to use it.
Add a comment...

Malwarebytes

Shared publicly  - 
 
When you jump online, your computer uses an IP address to communicate—something easily found and exploited by cybercriminals. Here's how to hide your IP address from prying eyes.
When you jump online, your computer uses an IP address to communicate—something easily found and exploited by cybercriminals. Here's how to hide your IP address from prying eyes.
35
10
Sidney Rutledge's profile photoAmba Merlinson's profile photoMrChrisgabber's profile photoNorman Lyon's profile photo
6 comments
 
Did Donald Trump commission an article of this nature to scare folks about internet access? The marketing intern who wrote this article will soon need to write articles on hiding your phone number, so you can't call or text folks (or receive the cal or text), and remove your home's address so gangs of immigrants won't be able to attack your home. The "solutions" provided are basic things folks should be doing, but using bogus fear tactics is just plain dumb, and makes Malware Bytes look like a company that doesn't understand security in the first place.
Add a comment...

Malwarebytes

Shared publicly  - 
 
We have been tracking a malvertising campaign distributing the Cerber ransomware linked to the actor behind the Magnitude exploit kit for months. Despite a global slowdown in exploit kit activity, this particular distribution channel has remained active and strong.
We have been tracking a malvertising campaign distributing the Cerber ransomware linked to the actor behind the Magnitude exploit kit for months. Despite a global slowdown in exploit kit activity, this particular distribution channel has remained active and strong. In this post we take a look at some past and present indicators of compromise that show how fake identities remain an effective way to defeat ad platforms' security checks.
7
Add a comment...

Malwarebytes

Shared publicly  - 
 
Ever wonder how they get all the shiny logos on a #NASCAR car? Thanks to the magic of time-lapse video, Malwarebytes, and Circle Sport – Leavine Family Racing, now you know: https://youtu.be/DSI8EG9CflQ
8
Juan Varela Santos's profile photo
 
Los felicito y que fácil parece mirando el vídeo.-
 ·  Translate
Add a comment...
People
In their circles
138 people
Have them in circles
16,773 people
Justin Lawrence's profile photo
Amir Firdaus Shuhaimi's profile photo
DENNIS MATHEW's profile photo
David Hannah's profile photo
Richard Knowles's profile photo
Iliyan Vasilareas's profile photo
Mooshy Amy (Moshi)'s profile photo
Wilfrid Bouchet's profile photo
Scott Basso's profile photo
Contact Information
Contact info
Email
Address
3979 Freedom Circle, 12th Floor Santa Clara, CA 95054
Story
Tagline
Crushes malware. Restores confidence.
Introduction
Malwarebytes is community. Malwarebytes is technology. Malwarebytes is a belief that every person has a fundamental right to a malware-free existence.

Malwarebytes grew from a single person to a team of extremely motivated and highly caffeinated developers, researchers and staff members. Today, Malwarebytes is a leading provider of anti-malware solutions to consumers and businesses alike. With a global research team working around the clock, millions of Malwarebytes’ users can sleep soundly (we don’t!) knowing their computer is protected.