Microsoft pushes patch to prevent ‘WannaCry’ level vulnerability

This month marks two years since the infamous WannaCry attack. Now a Remote Desktop Protocol (RDP) vulnerability has been discovered that could be used in a similar large-scale attack—though Microsoft has released a patch. Have you updated yet?

Categories:

Tags:

(Read more…)

The post Microsoft pushes patch to prevent ‘WannaCry’ level vulnerability appeared first on Malwarebytes Labs.

Exploit kits: spring 2019 review

In this edition, we review active and unique exploit kits hitting consumers and businesses over the spring season.

Categories:

Tags:

(Read more…)

The post Exploit kits: spring 2019 review appeared first on Malwarebytes Labs.

Electrum Bitcoin wallets under siege

Threat actors are relentlessly phishing and attacking Electrum Bitcoin wallet users, racking up millions of dollars.

Categories:

Tags:

(Read more…)

The post Electrum Bitcoin wallets under siege appeared first on Malwarebytes Labs.

Google Chrome zero-day: Now is the time to update and restart your browser

A particularly dangerous Google Chrome zero-day is already being used in real-world attacks. Despite Google’s auto update feature, users will need to close and restart their browser in order to be protected.

Categories:

Tags:

(Read more…)

The post Google Chrome zero-day: Now is the time to update and restart your browser appeared first on Malwarebytes Labs.

New critical vulnerability in open-source office suites

A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild?

Categories:

Tags:

(Read more…)

The post New critical vulnerability in open-source office suites appeared first on Malwarebytes Labs.

Underminer exploit kit improves in its latest iteration

We take a look at some recent changes with the elusive Underminer exploit kit.

Categories:

Tags:

(Read more…)

The post Underminer exploit kit improves in its latest iteration appeared first on Malwarebytes Labs.

How threat actors are using SMB vulnerabilities

SMB vulnerabilities have been so successful for criminals that they’ve been used in some of the most devastating ransomware and Trojan attacks of the last two years. Learn how they work and how your organization can protect against them.

Categories:

Tags:

(Read more…)

The post How threat actors are using SMB vulnerabilities appeared first on Malwarebytes Labs.