HackDig : Dig high-quality web security articles for hackers

Maze: the ransomware that introduced an extra twist

An extra way to create leverage against victims of ransomware has been introduced by the developers of the Maze ransomware. If the victim is not convinced that she should pay the criminals because her files are encrypted, there could be an extra method of extortion. Over time, more organizations have found ways to keep safe copies of their important files or
Publish At:2020-05-29 16:05 | Read:193 | Comments:0 | Tags:Threat spotlight data Fallout Maze pulse ransomware Spelevo

10 best practices for MSPs to secure their clients and themselves from ransomware

Lock-downs and social distancing may be on, but when it comes to addressing the need for IT support—whether by current of potential clients—it’s business as usual for MSPs. And, boy, is it a struggle. On the one hand, they keep an eye on their remote workers to ensure they’re still doing their job securely and safely in the comfort of their own homes.
Publish At:2020-05-24 07:20 | Read:126 | Comments:0 | Tags:How-tos account management B2B backup backups best MSP pract

A week in security (April 27 – May 3)

Last week on Malwarebytes Labs, we looked at how secure the cloud is, understood why unexpected demand can influence an organization to consider their “just in time” (JIT) system, speculated on why the threat actors behind the Troldesh ransomware suddenly released thousands of decryption keys, preached the good news about VPN being mainstream, touched on the
Publish At:2020-05-18 13:43 | Read:139 | Comments:0 | Tags:Malwarebytes news Apple APT awis bluetooth bluetooth attack

Top 10 most exploited vulnerabilities list released by FBI, DHS CISA

byLisa VaasWhen work-from-home became a sudden, urgent need in March, many organizations slapped together cloud-collaboration services such as Microsoft Office 365 for their newly locked-down staff.Unfortunately and understandably, pressure was high. People were scrambling. Thus did a number of those services get put together with a wing, a prayer, and misco
Publish At:2020-05-18 12:27 | Read:158 | Comments:0 | Tags:Malware Security threats Vulnerability .net Adobe Flash Apac

Introducing Malwarebytes Privacy

Here at Malwarebytes, we’re no strangers to using virtual private networks (VPNs) to protect our privacy while browsing online. Regular readers of our blog will remember that we’ve advised on VPN usage on many occasions, whether for mobile device users looking for anonymity or business owners wanting additional authentication protocols. We believe VPNs are a
Publish At:2020-05-03 14:39 | Read:313 | Comments:0 | Tags:Malwarebytes news Data privacy encryption IP address Malware

Lock and Code S1Ep5: Mythbusting and understanding VPNs with JP Taggart

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to JP Taggart, senior security researcher at Malwarebytes, about VPNs—debunking their myths, explaining their actual capabilities, and providing some advice on what makes a strong VPN. Tune in for all this and m
Publish At:2020-05-03 14:39 | Read:235 | Comments:0 | Tags:A week in security android trojan biometrics bots iOS mail b

COVID-19 Threats Against Mobile Remote Workers: What Enterprises Need to Know

COVID-19 has created a situation unlike anything many of us have ever seen; yet one that will likely leave permanent changes in remote working. With the overnight tectonic shift towards entire workforces working remotely from home, on all variety of corporate and personal (bring your own) devices, IT and security teams have been in triage mode from a securi
Publish At:2020-05-03 08:10 | Read:315 | Comments:0 | Tags:Mobile Threat Defense coronavirus COVID-19 malware mobile th

A week in security (March 30 – April 5)

Last week on Malwarebytes Labs, we offered readers tips for safe online shopping now that cybercriminals are ramping up Internet-based attacks, showed the impact that GDPR has around the world, and helped users understand how social media platforms mine their personal data. We also hosted our bi-weekly podcast, Lock and Code, with guest Adam Kujawa, who disc
Publish At:2020-04-06 15:45 | Read:333 | Comments:0 | Tags:A week in security covid-19 cyber volunteers draytek gdpr ho

Important tips for safe online shopping post COVID-19

As more and more countries order their citizens inside in response to COVID-19, online shopping—already a widespread practice—has surged in popularity, especially for practical items like hand sanitizer, groceries, and cleaning products. When people don’t feel safe outside, it’s only natural they’d prefer to shop as much as possible from the safety of
Publish At:2020-03-31 16:25 | Read:294 | Comments:0 | Tags:Awareness counterfeit online shopping padlock vpn web skimme

Are You Ready for the Remote Work’s Toll on Corporate Security?

Given the situation that many companies, organizations and government agencies have been forced into working remotely due to COVID-19, it is imperative to give some thought about corporate security.Using a VPN for New Stay-at-Home WorkersMillions of employees are now working from the confines of their own homes in an effort to keep businesses running smoothl
Publish At:2020-03-31 00:20 | Read:432 | Comments:0 | Tags:Featured Articles COVID-19 VPN Working from Home

Security tips for working from home (WFH)

Over the last decade, remote work and working from home has grown in popularity for many professionals. In fact, a 2018 study found more than 70 percent of global employees work remotely at least once per week. However, the coronavirus pandemic and resulting lockdown in many parts of the world have forced a large number of employees into unfamiliar
Publish At:2020-03-19 14:26 | Read:393 | Comments:0 | Tags:How-tos coronavirus password remote remote work remote worke

Bring your own privacy: VPNs for consumers and orgs

VPNs (virtual private networks) have been popular for quite some time now, and they’re worth a huge amount of money for the companies working in this area. They’re also at the forefront of combating potential repression and censorship around the world. It might all sound a bit esoteric and unrelated to your general day-to-day requirements, but VPNs are absol
Publish At:2020-03-06 17:29 | Read:731 | Comments:0 | Tags:Privacy anonymity anonymous desktop IP address Mobile privac

Threat spotlight: Phobos ransomware lives up to its name

Ransomware has struck dead on organizations since it became a mainstream tool in cybercriminals’ belts years ago. From massive WannaCry outbreaks in 2017 to industry-focused attacks by Ryuk in 2019, ransomware’s got its hooks in global businesses and shows no signs of stopping. That includes a malware family known as Phobos ransomware, named afte
Publish At:2020-01-10 16:50 | Read:769 | Comments:0 | Tags:Threat spotlight brute force coveware crysis crysis ransomwa

More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting

By Feike Hacquebord, Cedric Pernet, and Kenney Lu The threat group regularly referred to as APT33 is known to target the oil and aviation industries aggressively. This threat group has been reported on consistently for years, but our recent findings show that the group has been using about a dozen live Command and Control (C&C) servers for extremely narr
Publish At:2019-11-14 03:20 | Read:797 | Comments:0 | Tags:Botnets Targeted Attacks APT APT33 botnet phishing VPN

Increase your privacy with CyberGhost VPN

If you've followed Intego's blog and podcast for a while, you may recall that we've mentioned the privacy and security benefits of VPNs—virtual private networks—several times. As a quick recap, here are just a handful of the advantages that a good personal VPN can provide:hide your personal IP address from sites you visit, apps you use, and people you e-mail
Publish At:2019-11-11 22:10 | Read:691 | Comments:0 | Tags:Security & Privacy VPN

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud