How to prevent a rootkit attack

Credit to Author: Gilad Maayan| Date: Tue, 14 Jan 2020 17:31:55 +0000

Rootkit attacks are considered one of the most dangerous cyberthreats today. Learn what they are, how they infect systems, and how to protect against them.

Categories:

Tags:

(Read more…)

The post How to prevent a rootkit attack appeared first on Malwarebytes Labs.

Read more

6 ways hackers are targeting retail businesses

Credit to Author: Kayla Matthews| Date: Wed, 08 Jan 2020 18:04:10 +0000

Whether it’s a high-volume shopping season or not, retail businesses are at risk from cybercriminals in a number of ways. Learn how hackers target retailers and shoppers alike.

Categories:

Tags:

(Read more…)

The post 6 ways hackers are targeting retail businesses appeared first on Malwarebytes Labs.

Read more

Security resolutions for 2020 to stay safe online!

Credit to Author: Pavan Thorat| Date: Tue, 31 Dec 2019 12:31:33 +0000

As we are about to enter the new year, it’s ritualistic to reflect on our experiences from the passing year and make resolutions for the New Year. Most people make resolutions around good heath, their life goals, etc. Here is a different angle to our routine resolutions’ list – Security…

Read more

Spelevo exploit kit debuts new social engineering trick

Credit to Author: Jérôme Segura| Date: Wed, 18 Dec 2019 16:00:00 +0000

In order to maximize infection rate, threat actors are now launching the Spelevo exploit kit with a decoy adult site, social engineering users into downloading a malicious video player.

Categories:

Tags:

(Read more…)

The post Spelevo exploit kit debuts new social engineering trick appeared first on Malwarebytes Labs.

Read more

Fake Elder Scrolls Online developers go phishing on PlayStation

Credit to Author: Christopher Boyd| Date: Fri, 06 Dec 2019 20:29:26 +0000

We take a look at a pressure-filled phishing attempt sent to players of the Elder Scrolls Online video game.

Categories:

Tags:

(Read more…)

The post Fake Elder Scrolls Online developers go phishing on PlayStation appeared first on Malwarebytes Labs.

Read more

Sextortion scammers getting creative

Credit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of…

Categories:

Tags:

(Read more…)

The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.

Read more