Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void

There’s a new ransomware-as-a-service (RaaS) in town, and it can twist tongues for giggles as much as twist organizations’ arms for cash. Get to know the Sodinokibi ransomware, including how to protect against this fledgling threat.

Categories:

Tags:

(Read more…)

The post Threat Spotlight: Sodinokibi ransomware attempts to fill GandCrab void appeared first on Malwarebytes Labs.

No man’s land: How a Magecart group is running a web skimming operation from a war zone

We take a look into a Magecart group’s web skimming activities, which are relying on a bulletproof-friendly host in battle-scarred Luhansk, Ukraine to provide cover for their activities, safe from the reach of law enforcement and the security community.

Categories:

Tags:

(Read more…)

The post No man’s land: How a Magecart group is running a web skimming operation from a war zone appeared first on Malwarebytes Labs.

Compromising vital infrastructure: problems in education security continue

While educational organizations lack funding they are high on the target lists of cybercriminals. Does one fact lead to another?

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: problems in education security continue appeared first on Malwarebytes Labs.

Hi, honey. It’s mom. My phone is acting funny again.

Often, older generations must turn to their progenitors for help with technology. What are their frustrations and concerns, and how can younger generations better help?

Categories:

Tags:

(Read more…)

The post Hi, honey. It’s mom. My phone is acting funny again. appeared first on Malwarebytes Labs.

Meet Extenbro, a new DNS-changer Trojan protecting adware

We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.

Categories:

Tags:

(Read more…)

The post Meet Extenbro, a new DNS-changer Trojan protecting adware appeared first on Malwarebytes Labs.

A week in security (July 8 – 14)

A roundup of cybersecurity news from July 8–14, including secure data sending, federal data privacy law, the Soft Cell attack, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 8 – 14) appeared first on Malwarebytes Labs.

Cellular networks under fire from Soft Cell attacks

We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.

Categories:

Tags:

(Read more…)

The post Cellular networks under fire from Soft Cell attacks appeared first on Malwarebytes Labs.

Caution: Misuse of security tools can turn against you

If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Categories:

Tags:

(Read more…)

The post Caution: Misuse of security tools can turn against you appeared first on Malwarebytes Labs.

What should a US federal data privacy law ideally include?

What do small, privacy-protective companies think about a federal data privacy law for the US? It turns out, they’re all for it. Here are some of their ideas for US data privacy legislation.

Categories:

Tags:

(Read more…)

The post What should a US federal data privacy law ideally include? appeared first on Malwarebytes Labs.

Enterprise incident response: getting ahead of the wave

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.