Five easy ways to recognize and dispose of malicious emails

Five easy ways to recognize and dispose of malicious emails

What should you check for to determine if an email is spam or malicious? Here are five red flags to look for—and what to do with those malicious emails when you find ...
Internet Shortcut used in Necurs malspam campaign

Internet Shortcut used in Necurs malspam campaign

The Necurs gang tries out a new trick to load malware and bypass security defenses. Categories: Criminals Threat analysis Tags: botnetmalspamnecurssambaSMBspam (Read more...) The post Internet Shortcut used in Necurs malspam campaign ...

Labs CTNT report shows shift in threat landscape to cryptomining

What did we learn about cybercrime in the quarterly Labs CTNT report? Malicious cryptomining has taken over in 2018, and it’s leaving all other malware families behind. Categories: CTNT report Malwarebytes news ...
Know your threats: the nine scariest malware monsters

Know your threats: the nine scariest malware monsters

It’s been a particularly ghoulish year in cybersecurity, from Russian hacks to ransomware outbreaks. The bad boogey man in the black hoodie has been pulling one over the collective public. It’s dark ...
Old MS Office feature weaponized in malspam attacks

Old MS Office feature weaponized in malspam attacks

An old Microsoft Office feature has been brought back to the forefront as way to distribute malware without relying on macros or exploits. Categories: Malware Threat analysis Tags: DDEDDEAUTOmacromalspammalwaremicrosoftOfficeword (Read more...) The ...
Fake IRS notice delivers customized spying tool

Fake IRS notice delivers customized spying tool

Threat actors leverage a Microsoft Office exploit to spy on their victims. In this blog post, we will review its delivery mechanism and analyze the malware we observed, a modified version of ...
Locky ransomware returns to the game with two new flavors

Locky ransomware returns to the game with two new flavors

We recently observed a fresh malicious spam campaign pushed through the Necurs botnet distributing so far, two new variants of Locky ransomware. Categories: Cybercrime Malware Social engineering Tags: Diablo6LockyLocky ransomwareLukitusmalspamnecursransomware (Read more...) ...