3 things the Kaseya attack can teach us about ransomware recovery

Some lessons on dealing with ransomware recovery, thanks to the admirable transparency of a Dutch MSP impacted by the REvil attack on Kaseya. Categories: Ransomware Tags: kaseyaMSPransomwaresupply chainVelzArt (Read more...) The post 3 things the Kaseya attack can teach us about ransomware recovery appeared first on Malwarebytes Labs ... Read More

Patch now! Emergency fix for PrintNightmare released by Microsoft

Microsoft has issued out-of-band updates for the remote code execution PrintNightmare vulnerability. Categories: Exploits and vulnerabilities Tags: cisamicrosoftpatchprintnightmareupdateworkaround (Read more...) The post Patch now! Emergency fix for PrintNightmare released by Microsoft appeared first on Malwarebytes Labs ... Read More
Beware password-spraying fancy bears

Beware password-spraying fancy bears

| | Reports
A collection of three- and four- letter agencies have issued a report about a sustained GRU operation against "enterprise and cloud environments". Categories: Reports (Read more...) The post Beware password-spraying fancy bears appeared first on Malwarebytes Labs ... Read More

PrintNightmare 0-day can be used to take over Windows domain controllers

PrintNightmare is a 0-day vulbnerability in the widely used Windows Print Spooler service. And working exploits are out there. Categories: Exploits and vulnerabilities (Read more...) The post PrintNightmare 0-day can be used to take over Windows domain controllers appeared first on Malwarebytes Labs ... Read More

Babuk ransomware builder leaked following muddled “retirement”

Heads are being scratched after the Babuk ransomware builder appears on VirtuTotal, adding to the gang's reputation for confusion. Categories: RansomwareReports Tags: BabukdecryptionMPDraassource codevirustotal (Read more...) The post Babuk ransomware builder leaked following muddled “retirement” appeared first on Malwarebytes Labs ... Read More

Fired by algorithm: The future’s here and it’s a robot wearing a white collar

A Bloomberg investigation has revealed that Amazon Flex drivers are being evaluated, and in some cases fired, by algorithms. Categories: Reports Tags: AIalgorithmamazonamazon.comBotWFH (Read more...) The post Fired by algorithm: The future’s here and it’s a robot wearing a white collar appeared first on Malwarebytes Labs ... Read More

Explained: regular expression (regex)

What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process. Categories: Business Technology Tags: ddosJavaScriptnode.jsredosregexsearchservervulnerability (Read more...) The post Explained: regular expression (regex) appeared first on Malwarebytes Labs ... Read More
Can search extensions keep your searches private?

Can search extensions keep your searches private?

A lot of search extensions have been marketed over the year claiming to protect online privacy. Are they worth installing? We take a look at what these plugins actually have to offer. Categories: PUP Tags: chromeextensionsprivacysearchsearchalgowowmovix (Read more...) The post Can search extensions keep your searches private? appeared first on ... Read More
How to secure your content management system

How to secure your content management system

Popular content management systems are easy to install and use. But how easy is it to keep them secure? Categories: Security world Technology Tags: CMSCMS securitycontent management systemsdrupalJoomlawordpress (Read more...) The post How to secure your content management system appeared first on Malwarebytes Labs ... Read More
How to protect your RDP access from ransomware attacks

How to protect your RDP access from ransomware attacks

Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control? Categories: Business Security world Tags: businessransomwarerdpremote accessremote desktop protocol (Read more...) The post How to protect your RDP access from ransomware attacks appeared first on Malwarebytes Labs ... Read More
Loading...