<<   <   Page 2 / 2
Explained: Domain-Generating Algorithms
Malwarebytes Labs, Malwarebytes LabsCommentary
Cybercriminals use domain-generating algorithms to prevent their servers from being blacklisted or taken down.
By Malwarebytes Labs Malwarebytes Labs, 12/21/2016
Comment0 comments  |  Read  |  Post a Comment
Phishing Can Leverage Users To Bypass Sandboxes
Malwarebytes Labs, Malwarebytes LabsCommentary
Using social engineering to bypass traditional security defenses is not new and will certainly continue to grow.
By Malwarebytes Labs Malwarebytes Labs, 12/19/2016
Comment0 comments  |  Read  |  Post a Comment
Security In 2017: Ransomware Will Remain King
Malwarebytes Labs, Malwarebytes LabsCommentary
Businesses, consumers, and security professionals must face this reality and take the necessary steps to educate each other and protect their networks.
By Malwarebytes Labs Malwarebytes Labs, 12/13/2016
Comment0 comments  |  Read  |  Post a Comment
Survey Stresses Importance Of Securing The Internet of Things
Malwarebytes Labs, Malwarebytes LabsCommentary
If organizations monitor and deploy IoT devices with caution, they can stay ahead of the curve and continue to keep all of their endpoints protected.
By Malwarebytes Labs Malwarebytes Labs, 12/7/2016
Comment2 comments  |  Read  |  Post a Comment
5 Links Of The Attack Chain And How To Disrupt Them
Malwarebytes Labs, Malwarebytes LabsCommentary
By identifying steps in the attack chain, you can deploy appropriate defenses at each stage to prevent breaches from happening in the first place.
By Malwarebytes Labs Malwarebytes Labs, 11/28/2016
Comment1 Comment  |  Read  |  Post a Comment
Active Defense Framework Can Help Businesses Defend Against Cyberattacks
Malwarebytes Labs, Malwarebytes LabsCommentary
New report provides a framework that lets private sector entities defend themselves while at the same time protect individual liberties and privacy, and mitigate the risk of collateral damage.
By Malwarebytes Labs Malwarebytes Labs, 11/17/2016
Comment0 comments  |  Read  |  Post a Comment
8 Ways Businesses Can Better Secure Their Remote Workers
Malwarebytes Labs, Malwarebytes LabsCommentary
Remote workers may present challenges for IT staff, but a combination of cybersecurity best practices, strong policy, and a dedicated user awareness campaign could keep company data safe.
By Malwarebytes Labs Malwarebytes Labs, 11/14/2016
Comment0 comments  |  Read  |  Post a Comment
Ransomware Doesn’t Have To Mean Game Over
Malwarebytes Labs, Malwarebytes LabsCommentary
3 methods can help you recover from a ransomware attack relatively unscathed.
By Malwarebytes Labs Malwarebytes Labs, 11/8/2016
Comment0 comments  |  Read  |  Post a Comment
Phishing Threat Continues To Loom Large
Malwarebytes Labs, Malwarebytes LabsCommentary
Phishing and spear phishing will only get worse unless companies proactively train employees to recognize a scam when they see one.
By Malwarebytes Labs Malwarebytes Labs, 11/2/2016
Comment0 comments  |  Read  |  Post a Comment
Vendor Security Alliance To Improve Cybersecurity Of Third-Party Providers
Malwarebytes Labs, Malwarebytes LabsCommentary
Member companies can use their VSA rating when offering their services, effectively skipping the process of verification done by prospective businesses.
By Malwarebytes Labs Malwarebytes Labs, 10/24/2016
Comment4 comments  |  Read  |  Post a Comment
<<   <   Page 2 / 2
1268
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com/business.
Featured Writers
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...