| Date | Title | Description |
| 17.03.2026 | People are quitting ChatGPT and Gemini over privacy concerns | It looks like the digital infatuation with artificial intelligence has cooled off, as people are either quitting AI chatbots entirely or have stopped sharing their personal information with them.
According to a new report from Malwarebytes,... |
| 13.03.2026 | Microsoft Authenticator Flaw on Android, iOS Could Leak Login Codes for Millions | Image: Aminu Abdullahi/TechRepublic
A newly discovered vulnerability in Microsoft Authenticator could expose sensitive login codes to malicious apps on the same device, raising concerns about the security of one of the most widely used mult... |
| 10.03.2026 | Fake Gemini AI Chatbot Promotes ‘Google Coin’ in New Crypto Scam | Image: Malwarebytes
A convincing chatbot pretending to be Google’s AI assistant is now being used to pitch a fake cryptocurrency called “Google Coin,” according to cybersecurity researchers.
Researchers at Malwarebytes say scammers created ... |
| 02.03.2026 | ТОП-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — Microsoft обновляет базовый пакет безопасности для Windows Server 2025, новая волна рассылок Head Mare, вредоносное ПО имитирует обновление Zoom Update, в новой версии Wireshark устранены уязвимости в системе безопасности,... |
| 20.02.2026 | Scammers Use Fake Gemini AI Chatbot for Crypto Scam | Image: vanenunes (Envato)
If a chatbot claiming to be Gemini AI begins to promote a new Google cryptocurrency, it’s best to ignore it.
Security researchers have uncovered a fake “Google Coin” presale site powered by a counterfeit Gemini AI ... |
| 16.02.2026 | ТОП-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — ботнет SSHStalker взломал 7000 машин под управлением Linux, расширение Chrome крадет корпоративные данные, фальшивый 7-Zip превращает ПК в скрытый прокси-узел, вредоносная надстройка для Outlook похитила более 4000 учетных... |
| 21.01.2026 | Аптечка сисадмина: необходимый набор ПО для Linux и Windows | У каждого системного администратора должен быть набор программных решений для практически любой ситуации — некая серверная аптечка первой помощи. В статье собрал базовый минимум ПО для «лечения» основных болезней серверов на Linux и Windows... |
| 12.01.2026 | Instagram** исправил проблему отправки электронных писем со сбросом пароля | В Instagram** исправили ошибку, позволявшую злоумышленникам массово рассылать электронные письма с запросами на сброс паролей. Ранее сообщалось, что данные более чем 17 млн аккаунтов соцсети были скопированы и утекли в сеть.
«Мы исправили п... |
| 11.01.2026 | Instagram says it fixed the issue behind shady password reset emails | Over the past few days, numerous Instagram users received an email regarding a password reset request. Around the same time, it was reported that cybercriminals had scraped the personal data of over 17 million users and that recent password... |
| 11.01.2026 | Instagram Fixes Password Reset Issue After Malwarebytes Called it a Security Breach | By Isaiah Richard
Published: Jan 11 2026, 22:40 PM EST
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard |
| 10.01.2026 | Instagram data of 17.5 million users resurfaces online after 2024 incident | A massive treasure trove of Instagram user data has just bubbled back up to the surface, and it’s putting millions of accounts back in the crosshairs more than a year after the original leak was thought to be dead and buried.
Roughly 17.5 m... |
| 06.01.2026 | Navigating Performance: Optimizing Diverse Computing Architectures | Computing performance is a complex equation. Legacy hardware, exemplified by the ThinkPad X220, reveals surprising truths. Older operating systems, like Windows 8.1 and even XP, often deliver superior speed and efficiency compared to Window... |
| 06.01.2026 | Google Faces Gmail Lawsuit Over Hidden AI Training Settings | Image: Envato
Gmail users will not be overjoyed to discover that Google has been quietly feeding their private messages and attachments to its AI systems.
The tech giant now faces a class-action lawsuit after enabling “Smart Features” acros... |
| 03.01.2026 | Энтузиасты протестировали производительность Lenovo ThinkPad X220 в Windows XP, Vista, 7, 8.1, 10 и 11 | Команда энтузиастов протестировала работоспособность, скорость и производительность ноутбука Lenovo ThinkPad X220 в различных бенчмарках и задачах в шести ОС от Microsoft — Windows XP, Windows Vista, Windows 7, Windows 8.1, Windows 10 и Win... |
| 30.12.2025 | New ‘GhostPairing’ Technique Enables Undetected WhatsApp Access | Image: Generated via Google’s Nano Banana
Hackers no longer need to break into WhatsApp accounts. They just let themselves in.
Cybersecurity researchers at technology firm Gen Digital have uncovered a new attack that quietly links an attack... |
| 23.12.2025 | Featured Chrome extension could be copying your AI chats | A security warning is a nasty surprise, especially when the add-on in question claims it exists to protect your privacy. Researchers at Koi Security say Urban VPN Proxy, a VPN extension for Google Chrome and Microsoft Edge, began logging us... |
| 24.11.2025 | Google nega usar emails para treinar inteligência artificial | Funções inteligentes existem há anos no Gmail (ilustração: Vitor Pádua/Tecnoblog)
O melhor da tecnologia está no nosso canal no WhatsApp
Entre Agora Resumo
O Google negou usar emails do Gmail para treinar sua inteligência artificial, esclar... |
| 21.11.2025 | Проверьте почту: Gmail по умолчанию использует электронные письма для улучшения ИИ-функций | Журналисты издания Malwarebytes заметили, что в настройках Gmail у некоторых пользователей появился пункт «Умные функции». С его помощью можно активировать умные функции на основе нейросетей. На странице поддержки отмечается, что компания м... |
| 21.11.2025 | Gmail já usa seus emails para treinar IA; saiba desativar | IA do Google lê mensagens do Gmail (ilustração: Vitor Pádua e Thássius Veloso/Tecnoblog)
O melhor da tecnologia está no nosso canal no WhatsApp
Entre Agora
A privacidade no Gmail voltou ao centro das atenções após viralizar um alerta de que... |
| 28.10.2025 | MacPaw’s Moonlock app promises clutter-free security for your Mac | What’s happened? MacPaw, the company best known for CleanMyMac, has now launched a new standalone security app built exclusively for macOS, called Moonlock. It combines real-time malware defense, a built-in VPN, and smart insights in a desi... |
| 20.10.2025 | Prosper Confirms Data Breach Impacting 17 Million Users | Image: Unsplash
Prosper Marketplace has confirmed a cybersecurity breach that exposed personal data from more than 17 million users, highlighting ongoing challenges for financial institutions that manage sensitive customer information.
The ... |
| 13.10.2025 | What Is Mp3Juice and How Does It Work? | Share
Share
Share
Share
Email
In an era where music is the soundtrack to our lives, accessing songs on demand has become a necessity. Whether you’re curating a playlist for a road trip, editing a video, or simply unwinding after a long day,... |
| 21.09.2025 | Best Place to Buy Windows 11 Key in 2025 | Share
Share
Share
Share
Email
Windows 11 is one of the best operating systems that transformed our interaction with the devices. The sleek interface, security features, productivity tools makes it a perfect match for almost everyone. As of ... |
| 27.07.2025 | ‘Quishing’ scams dupe millions of Americans as cybercriminals turn the QR code bad | To join the CNBC Technology Executive Council, go to cnbccouncils.com/tec
Almost three-quarters of Americans (73%) scan QR codes without verification, and more than 26 million have already been directed to malicious sites, according to Nord... |
| 22.07.2025 | Malwarebytes expands cloud platform with real-time email security capabilities
Join theCUBE Alumni Trust Network
Send us a News Tip
EXTRACT THE SIGNAL FROM THE NOISE
Cookies | Cybersecurity software firm Malwarebytes Inc. today announced the launch of ThreatDown Email Security, a new email security module designed to combat email-based threats.
The new module in the ThreatDown product family is powered by artific... |
| 22.07.2025 | AV-Comparatives Publishes World's Largest Independent Enterprise Cybersecurity Solution Test | 17 Top-Tier Enterprise EPP, EDR, and XDR Solutions Evaluated in the Most Comprehensive ISO 9001:2015-Certified Public Assessment to Date
INNSBRUCK, Austria, July 22, 2025 /PRNewswire/ -- AV-Comparatives, the globally recognised authority in... |
| 08.07.2025 | 'Revenue Within Days': A Teenager's Side Hustle Grew Out of a Video Game Virus — and Into a Multi-Hundred-Million-Dollar Business Now 35, Marcin Kleczynski is a Bay Area-based founder who's continuing... | It's the era of the side hustle, and if you've ever considered starting one to earn some extra cash outside of your 9-5, you're in good company. These days, more than one-third of U.S. adults have side hustles, and their supplemental gigs m... |
| 19.06.2025 | Novo golpe pode enganar até quem sabe navegar na web | O melhor da tecnologia está no nosso canal no WhatsApp
Entre Agora
SAC falso é exibido no site oficial da Apple (imagem: reprodução/Malwarebytes) Resumo
Golpistas usam anúncios em buscadores para exibir sites falsos com telefone fraudulento... |
| 12.06.2025 | The Rising Tide of Financial Scams: Navigating the Waters of Deceit | In the digital age, financial scams are like weeds in a garden—growing faster than we can pull them out. Recent reports reveal a staggering rise in fraud cases, with criminals pocketing over £1 billion in the UK alone in 2024. The numbers a... |
| 11.06.2025 | Mobile Scams are Now a Daily Threat for Nearly Half of All Users | Scams have become a daily threat for nearly half of all mobile users, new data from Malwarebytes reveals.
Their research from 1,300 mobile users across the globe details a world where mobile scams are no longer the exception, they are the r... |
| 19.05.2025 | Malwarebytes vs McAfee: Which Antivirus Is Right for You? | McAfee is one of the grand old names in cybersecurity dating back to 1987. Although it was born in the days before PC-based distributed computing, it has steadily modernized its tools for cloud-based ecosystems. Malwarebytes has only been a... |
| 19.03.2025 | The Encryption Tug-of-War: A Global Dilemma | In the digital age, privacy is a fortress. But what happens when governments demand the keys? The recent upheaval in the UK over Apple’s encryption policies has sent shockwaves across the globe. This isn’t just a local skirmish; it’s a batt... |
| 18.03.2025 | The overseas Apple iPhone encryption battle that could be headed to the U.S. next | To join the CNBC Technology Executive Council, go to cnbccouncils.com/tec
Apple recently removed an iPhone privacy feature rather than comply with a new UK law requiring the company to create a backdoor to allow the government to access enc... |
| 17.03.2025 | What Is POS Security? Definition, Features & Benefits | Key Takeaways
Point-of-sale (POS) security operates through a combination of hardware and software protections designed to prevent unauthorized access and data theft.
A well-planned POS security includes multi-layered programs, such as encr... |
| 02.03.2025 | The Cloud Cost Conundrum: A Wake-Up Call for Enterprises | In the vast landscape of modern business, cloud computing stands as a towering giant. It offers flexibility, scalability, and efficiency. Yet, lurking beneath its shiny surface is a costly pitfall. Enterprises are set to waste billions due ... |
| 24.02.2025 | Apple has removed its strongest data protection from UK users -- why and what does it mean? | Apple's Advanced Data protection allows the data that its users store in iCloud to be end-to-end encrypted. On Friday of last week the company announced that it would be removing this tool from users in the UK.
The move follows a demand fro... |
| 08.02.2025 | How to block your phone from tracking your location | Experts warn location data could be used to track people who visit abortion clinics. Or “a disgruntled ex could use location sharing to stalk someone, or a current, abusive partner could force you into location sharing as a means of control... |
| 07.02.2025 | ‘Big Game’ Ransomware Tactics Drives Spike in Attacks | The number of known attacks increased 13% last year, with over six hundred attacks recorded in November 2024, more than any other month over the last two years, according to the latest figures from Malwarebytes.
The security providers State... |
| 06.02.2025 | Will Agentic AI Reshape Cybersecurity in 2025? | The arrival of agentic AI models in 2025 will mark the transformation of artificial intelligence from helpful assistants into peers, or even experts, that can solve problems unaided, and force security teams to rethink defence strategies, a... |
| 06.02.2025 | Ransomware Payments Decreased by 35% in 2024, Research Finds | Ransomware payments took an unexpected plunge in 2024, dropping 35% to approximately $813.55 million — despite payouts surpassing $1 billion for the first time in 2023. The decline was largely driven by a series of successful law enforcemen... |
| 05.02.2025 | Как не превратить рабочий ноутбук в решето: простые правила и полезные программы | Ваш рабочий ноутбук — это не просто инструмент для работы, а хранилище корпоративных секретов, персональных данных и доступов к важным ресурсам. Одно неловкое движение — и всё это может оказаться в руках злоумышленников. В этой статье разбе... |
| 03.02.2025 | Microsoft passwords at risk as hackers exploit Google | Forbes reports that hackers are targeting Microsoft advertiser accounts in an attempt to steal login information and access the advertising platform. Malwarebytes researchers discovered how hackers use malicious ads appearing on Google Sear... |
| 17.01.2025 | How to Break a Phone: Common Causes of Phone Damage | We depend upon our smartphones. They keep us connected, informed, and updated during the hectic daily grind. For many of us, those smartphones have become more than a simple tool, so we should probably take better care of them than we do. I... |
| 10.12.2024 | Cybersecurity News Round-Up 2024: 10 Biggest Stories That Dominated the Year | This year has not been quiet for the cybersecurity field. We have seen record-breaking data breaches, huge ransomware payouts, and illuminating studies about the impact of the increasingly complex and ever-evolving threat landscape.
As we a... |
| 06.12.2024 | Understanding Cross-border Payments: A Complete Guide | Key takeaways:
Cross-border payments depend on key factors such as currency conversion, country-specific and international financial regulations, and available payment methods.
Interoperability among banks and other financial institutions i... |
| 03.12.2024 | AV-Comparatives Announces 2024 Phishing Test Results: Avast and McAfee Excel in Yearly Assessment | INNSBRUCK, Austria, Dec. 3, 2024 /PRNewswire/ -- AV-Comparatives, a leading independent organisation for IT security testing, has published the results of its comprehensive 2024 phishing protection tests. Over the year, 1,000 phishing URLs ... |
| 19.11.2024 | The 6 Best Free Antivirus Software Providers for Mac in 2024 | Best overall: BitdefenderBest cleanup utility: MalwarebytesBest for free add-on features: AviraBest for detecting viruses in removable media: AVGBest for beginners: AvastBest for free utilities: Total AV
Many Mac users wonder if they need e... |
| 08.11.2024 | Malwarebytes Acquires AzireVPN | Malwarebytes, a Santa Clara, CA-based company which specializes in real-time cyber protection solutions, acquired AzireVPN, a privacy-focused VPN provider.
The amount of the deal was not disclosed.
By integrating AzireVPN’s advanced VPN tec... |
| 21.10.2024 | The 6 Best Antivirus Software Providers for Mac in 2024 | Best overall: BitdefenderBest for supplemental threat detection: MalwarebytesBest free antivirus for Mac: AvastBest for large companies: ESETBest customizable AV: AviraBest lightweight antivirus app: Surfshark
People often ask if Macs reall... |
| 18.10.2024 | Ransomware Resurgence: The Growing Threat Landscape | The digital landscape is a battlefield. Ransomware groups are the marauders, lurking in the shadows, ready to strike. A recent report from Cyberint reveals a staggering rise in active ransomware groups. In the second quarter of 2024, 58 gro... |
| 17.10.2024 | Number of Active Ransomware Groups Highest on Record, Cyberint’s Report Finds | This year has seen the highest number of active ransomware groups on record, with 58 attacking global businesses in the second quarter. Threat intelligence platform provider Cyberint has reported only a slight dip in the third quarter, with... |
| 09.10.2024 | 20% of Generative AI ‘Jailbreak’ Attacks Succeed, With 90% Exposing Sensitive Data | Generative AI jailbreak attacks, where models are instructed to ignore their safeguards, succeed 20% of the time, research has found. On average, adversaries need just 42 seconds and five interactions to break through.
In some cases, attack... |
| 04.10.2024 | The Rising Tide of Digital Deception: Deepfakes and Cybersecurity | In the digital age, reality is becoming a malleable concept. Deepfakes, once a novelty, are now a looming threat. A recent survey reveals that 94 percent of security professionals are worried about the implications of deepfakes. This isn’t ... |
| 04.10.2024 | Malwarebytes Browser Guard gains new identity features | Browser Guard, the free browser extension from Malwarebytes, has added some new features aimed at enhancing users' privacy and protecting their identity online.
Users will now receive a pop-up alert if a website they visit was involved in a... |
| 17.09.2024 | Топ-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — удар бэкдора Loki по российским компаниям, нацеленные на серверы IIS атаки DragonRank, применение инструментов Kaspersky для отключения EDR, использование серверов Oracle WebLogic для майнинга и DDoS-атак, новые атаки Eart... |
| 17.09.2024 | 80% of Critical National Infrastructure Companies Experienced an Email Security Breach in Last Year | Cyber attackers are repeatedly using malicious emails to infiltrate critical national infrastructure. Up to 80% of CNI companies experienced an email-related security breach in the last year, according to a new report from security solution... |
| 16.09.2024 | Hackers Might Be Forcing Chrome Users to Give Their Google Passwords Through 'Annoyance' Method | By Joseph Henry
Published Sep 16, 2024 8:44AM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
Google Chrome is at risk of running malware-ridden extensions, but that's not the only... |
| 03.09.2024 | The 6 Best Antivirus Software Options for Windows in 2024 | Best overall: Bitdefender GravityZone Best for multi-layered protection: ESET PROTECT Best managed detection and response: Malwarebytes ThreatDown Best for small businesses: Avast Best for custom security bundles: Trend Vision One from Tren... |
| 29.08.2024 | Navigating the Cybersecurity Landscape: Free Endpoint Protection and Strategic Acquisitions | In the digital age, cybersecurity is a fortress. Yet, not all fortresses are built the same. As businesses grapple with the rising tide of cyber threats, the need for robust endpoint protection becomes paramount. Fortunately, several free e... |
| 27.08.2024 | The 5 Best Free Endpoint Protection Platforms for 2024 | Best overall free endpoint protection platform: Bitdefender Best for easy set-up: Avast Best for free one-time scans: ESET Best complete endpoint security solution: Malwarebytes Best for multiple free security tools: Trend Micro
Endpoint pr... |
| 21.08.2024 | The 6 Best Malware Removal Software Providers for 2024 | Best overall malware removal tool: Bitdefender Best malware removal with multiple features: Norton Best for detecting tough malware: Malwarebytes Best affordable malware removal software: TotalAV Best malware removal software for beginners:... |
| 20.08.2024 | Ransomware attacks rise over 60 percent | In the last year, the US has experienced a dramatic 63 percent increase in ransomware attacks, with the UK seeing an even greater rise of 67 percent.
The latest State of Ransomware report from Malwarebytes shows the share of attacks carried... |
| 20.08.2024 | Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds | Threat actors are taking advantage of when security professionals are off-duty to stage their ransomware attacks, new research has found. The ThreatDown 2024 State of Ransomware report from Malwarebytes has revealed most incidents in the la... |
| 20.08.2024 | Three-Quarters of Companies Retain An Increasing Amount of Sensitive Data, Report Finds | The volume of sensitive data that companies are harbouring in non-production environments, like development, testing, analytics, and AI/ML, is rising, according to a new report. Executives are also getting more concerned about protecting it... |
| 15.08.2024 | Malwarebytes launches new unified cyber protection platform | Malwarebytes has introduced a new generation of its cyber protection platform, aiming to provide a unified and seamless user experience across desktop and mobile products. The centrepiece of this updated platform is an all-in-one dashboard ... |
| 01.08.2024 | Authenticator falso vem com malware e usa até propaganda no Google | Google Authenticator serve para gerar códigos de autenticação em dois fatores (Imagem: Vitor Pádua / Tecnoblog)
Saiba mais sobre Google no nosso canal no WhatsApp
Entre Agora
Um ataque de malware adotou uma estratégia ousada: criar um site ... |
| 31.07.2024 | Update your Chrome browser now to gain this critical security feature | Google
Yesterday, in a blog post on Google’s security blog, Willian Harris from Chrome’s Security Team said that Google is improving the security of Chrome cookies on Windows PCs by adopting a similar method used in macOS to help protect us... |
| 11.07.2024 | RockYou2024 Leak: 10 Billion Passwords Posted on Hacking Forum, Should You Be Worried? | By Joseph Henry
Published Jul 11, 2024 1:57PM EDT
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Share on Flipboard Share on Pocket
A massive data breach has exposed a staggering 10 billion unique passwords, potentiall... |
| 01.07.2024 | Энтузиаст подключил Windows XP к интернету, и она за пару минут нахватала вирусов | Как вы думаете, насколько легко подцепить вирус в 2024 году, если пользоваться Windows XP? Возможно, вы предполагаете, что можете спокойно бродить по интернету, пока не наткнётесь на заражённый вирусом сайт или баннер? Как оказалось, даже п... |
| 27.06.2024 | Mac users served info-stealer malware through Google ads | Enlarge
Getty Images reader comments 71
Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted circulating through Google ads, making it at least the second time in as many months the widely use... |
| 07.06.2024 | TikTok mitigates malware attacks targeting high-profile accounts | figcaption>span]:font-sans" data-chromatic="ignore">
TikTok says it has fixed a vulnerability that led to a rare type of cyberattack this week.
Why it matters: Hackers sent a private, malware-laced message to users that... |
| 07.06.2024 | Simpplr Welcomes Marketing Powerhouse Gary Sevounts as Chief Marketing Officer | Simpplr.com
Simpplr proudly welcomes seasoned marketer Gary Sevounts as its new Chief Marketing Officer (CMO).
Sevounts' Proven Expertise In High-Growth Strategies and Category Building Will Amplify Simpplr's Market Leadership
REDWOOD CITY,... |
| 26.05.2024 | Six steps to safeguarding your digital identity | We lose a bit of our digital privacy with every data breach that occurs. A breach like the one at AT&T -- which exposed Social Security numbers and other personal information needed for identity theft -- is particularly serious in the l... |
| 16.05.2024 | Windows XP é invadido em minutos depois de ser conectado à internet | Sem suporte da Microsoft desde 2014, Windows XP é alvo fácil de vulnerabilidade (Imagem: Alan Levine / Flickr)
Saiba mais sobre Windows XP no nosso canal no WhatsApp
Entre Agora Resumo
O youtuber Eric Parker mostrou a vulnerabilidade do Win... |
| 06.05.2024 | Spyware Problems Are Getting Under Apple iPhone's Skin Through the Years | Joseph Henry, Tech Times 06 May 2024, 09:05 am
Just like malware, spyware can easily invade your precious iPhone. Even with the most advanced mobile security, Apple still struggles to remove the unwelcomed guests in its handsets.
With the r... |
| 02.05.2024 | Passwords cling on to celebrate another World Password Day | Last year we asked the question whether it was time to make World Password Day a thing of the past. But despite the rollout of passkey technology from giants like Google, passwords are still here a year on.
There's no doubt that the use of ... |
| 11.04.2024 | New Malwarebytes tool lets you see where your data is exposed | With so many data breaches having taken place it's almost inevitable that at least some of your personal information has been exposed online. But finding out exactly what can be tricky.
Malwarebytes is launching a new web portal that gives ... |
| 09.04.2024 | Автор Notepad++ ищет помощи в удалении копии своего веб-сайта | Разработчик бесплатного проекта редактора текста и исходного кода Notepad++ Дон Хо обратился к общественности. Он просит помочь ему закрыть «сайт-паразит», который выдаёт себя за Notepad++.
Хотя ресурс notepad[.]plus перенаправляет посетите... |
| 19.03.2024 | LockBit ransomware gang’s power diminished but not eradicated | Although action by UK and US authorities against the LockBit ransomware gang is a major setback for its operations – and is likely to inhibit its ability to recruit affiliates – such criminal groupings are notoriously resilient and will pro... |
| 14.03.2024 | Fakebat Malware Deceives Victims Through 'Malvertising' Campaigns | Joseph Henry, Tech Times 14 March 2024, 06:03 pm
Researchers see a surge in search-based malvertising campaigns. Last month, the cases nearly doubled the documented incidents.
Among the familiar payload deployments, novel evasion tactics em... |
| 12.03.2024 | Полумошеннические конторы по ремонту ПК: любопытные эпизоды и советы | В предыдущей статье я поделился внутренней кухней полумошеннических контор по ремонту техники. Вместе с читателями мы разобрались со схемами работы самопровозглашенных мастеров и их уловками. Однако кое-что не попало в статью. Проанализиров... |
| 08.03.2024 | Best Windows apps this week | Five-hundred-and-eighty-five in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.
Microsoft announced that it is reti... |
| 05.03.2024 | Malwarebytes 5.0 sneaks out, sporting modern new interface and Trusted Advisor | Malwarebytes is quietly rolling out a major new version of its eponymous anti-malware tool with the release of Malwarebytes 5.0. The tool is available in both free and premium versions for desktop and mobile.
MBAM 5.0 is released almost fiv... |
| 29.02.2024 | Осторожно, IoT: как бытовая техника становится проблемой для компаний | Февраль 2024-го оказался щедрым на новости о проблемах с безопасностью IoT-устройств. Пока мы следили за санта-барбарой с DDoS-атакой 3 млн зубных щеток, фоном прошло немало других интересных событий.
В этой статье обсудим последние новости... |
| 16.02.2024 | Employees tricked into downloading remote monitoring software | New research from Malwarebytes reveals that employees are being tricked into downloading remote monitoring and management tools like AnyDesk to open up back doors to corporate networks.
In a standard phishing technique potential victims are... |
| 12.02.2024 | Security Week 2407: о (без)опасности умных зубных щеток | В потоке новостей по информационной безопасности редко, но регулярно появляются либо просто странные, либо полностью выдуманные «исследования». На прошлой неделе широко обсуждался (в том числе на Хабре) совсем уж выдающийся пример воображае... |
| 25.01.2024 | Когда пользователь устал, или Как хакеры обходят MFA | В начале января от действий скамера пострадала Mandiant — ИБ-дочка Google. Злоумышленник взломал аккаунт компании в Twitter (запрещен в РФ) и использовал его для криптографического мошенничества. Оказалось, что в инциденте виноваты сотрудни... |
| 24.01.2024 | Security Researchers Unearth Compilation of Multiple Breaches, Citing it 'Mother of All Breaches' | Joseph Henry, Tech Times 24 January 2024, 08:01 am |
| 06.12.2023 | Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware | The Cisco Talos Year in Review report released Tuesday highlights new trends in the cybersecurity threat landscape. We’ll focus on three topics covered: the ransomware cybercriminal ecosystem, network infrastructure attacks and commodity lo... |
| 30.11.2023 | ScamClub Malvertising Campaign Infects ESPN, Other News Sites With Fake McAfee Alerts | Joseph Henry, Tech Times 30 November 2023, 02:11 pm
ScamClub, a notorious malvertising actor, is discovered to be delivering a wave of fake McAfee virus alerts across top-tier news sites. The findings were shared by Malwarebytes in its late... |
| 29.11.2023 | Protect Yourself: Best Antivirus Tools of 2023 You Need to Use Right Now | Joseph Henry, Tech Times 29 November 2023, 10:11 am
The world of cybersecurity is often overlooked in society since some people underestimate what hackers can do with their devices, because of this, many fall victim to these dark schemes.
I... |
| 22.11.2023 | Atomic Stealer Distributes Malware to Macs Through False Browser Downloads | Anti-malware software provider Malwarebytes has described a new variant of Atomic Stealer (also known as AMOS), which is malware targeting Apple users. The new malware variant, distributed through the fake browser update delivery mechanism ... |
| 21.11.2023 | BEWARE: Atomic macOS Stealer Malware Appears as Fake Safari, Chrome Updates | Isaiah Richard, Tech Times 21 November 2023, 07:11 pm
Do not believe everything you see online and always be vigilant, as the return of notorious Mac malware is back at it again, now pushing for a fake Safari and Google Chrome browser updat... |
| 16.11.2023 | Children’s tablet has malware and exposes kids’ data, researcher finds | In May this year, Alexis Hancock’s daughter got a children’s tablet for her birthday. Being a security researcher, Hancock was immediately worried.
“I looked at it kind of sideways because I’ve never heard of Dragon Touch,” Hancock told Tec... |
| 10.11.2023 | Malwarebytes for Business rebrands as 'ThreatDown' | In a bid to distinguish between its consumer and business offerings, Malwarebytes is relaunching its endpoint security platform for business as ThreatDown.
ThreatDown comes with a new Security Advisor dashboard and is available as a number ... |
| 02.11.2023 | Do government sanctions against ransomware groups work? | Earlier this year, the U.S. government imposed sanctions against Russian national Mikhail Matveev, an FBI most-wanted cybercriminal, who authorities accuse of being a “prolific ransomware affiliate” involved in cyberattacks in the United St... |
| 01.11.2023 | Las Vegas CIO doubles down on AI and endpoint security to protect Sin City | VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Hear from top industry leaders on Nov 15. Reserve your free pass
VentureBeat recently sat down (virtually) with Michael Sherwood, chief innovatio... |
| 31.10.2023 | Mission data privacy: Empowering consumers in an era of rapid change | Whether browsing online for clothes or catching up on the latest news, we’ve all had that unwanted internet cookie pop-up appear. At face-value they may seem harmless, but cookies are a goldmine of private information, posing a serious risk... |
| 27.10.2023 | Malwarebytes launches ID theft protection for consumers | This week Malwarebytes has launched a new identity theft protection solution aimed at individuals, helping them secure their digital identities and defend against identity and online threats.
Called -- imagine how many meetings it must have... |
| 20.10.2023 | Рекламную кампанию с вредоносом под видом Notepad++ не блокировали месяцами | Исследователи компании Malwarebytes рассказали о кампании с вредоносной рекламой в Google-поиске, которая нацелена на пользователей, желающих загрузить популярный текстовый редактор Notepad++. Эту кампанию не замечали несколько месяцев.
Исс... |