Advanis tech support screenlocker

By Pieter Arntz Recently we noticed a change on one of the domains that we monitor because they are known to host files related to tech support scams and involved in browlocks, fake alerts, and screenlockers. The domain and the screenlocker At the moment the installer is being pushed by InstallCapital which is a pay-per-install network . The domain hosting the installer is called … [Read more...]

New targeted attack against Saudi Arabia Government

By Malwarebytes Labs A new spear phishing campaign is targeting Saudi Arabia governmental organizations. The attack originates from a phishing email containing a Word document in Arabic language. If the victim opens it up, it will not only infect their system but send the same phishing document to other contacts via their Outlook inbox. We know that at least about a dozen Saudi agencies were … [Read more...]

Hackers threaten to wipe Apple devices

By Thomas Reed According to a report from Motherboard, a group of hackers calling themselves “Turkish Crime Family” is threatening to remotely erase devices belonging to hundreds of millions of Apple customers. They will do this on April 7, they say, if Apple doesn't pay them a ransom. The hackers claim to have access to over 300 million iCloud e-mail addresses (addresses ending in, … [Read more...]

How to run Microsoft Outlook on Mac

By Kayla Myrhow When it comes to running Microsoft Outlook on a PC versus Mac, the choice between the two is often less a question of need and more a question of preference. It is essentially the specific functionality of these products that creates the user preference. Preference can, of course, be influenced by need, and every user [...] The post How to run Microsoft Outlook on Mac appeared … [Read more...]

MDaemon 17 Adds New Security and Collaboration Features

By Brad.Wyro Dropbox Integration for Webmail Users, Popular IM Client Connections, Support for Let's Encrypt, new Message Scheduling, and More! Businesses around the world have depended on the reliability and security of MDaemon for over 20 years. With the release of MDaemon 17, we've included additional security features and introduced several new features for WorldClient, MDaemon's … [Read more...]

SMS phishing for the masses

By Jérôme Segura Phishing remains one of the top threats that affects both consumers and businesses thanks to ever evolving tricks. While ‘classic' phishing emails remain a problem, they can somewhat be thwarted via spam filters, whereas SMS phishing scams are much more difficult to protect against. Case in point, here's a fraudulent text message purporting to be from RBC, a Canadian financial … [Read more...]

Prioritize Hosts Dashboard

By David Schwalenberg Vulnerability ManagementWhat systems on your network need attention now? With all the administrative work you need to have done by yesterday, how do you prioritize mitigation efforts to deal with host vulnerabilities? The enhanced vulnerability detection capabilities of™ can help you make the best prioritization decisions for keeping your network … [Read more...]

Privileged Behavioral Analytics 101 – How does PBA strengthen IT security

By Chris Widstrom According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our Privileged Account Management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the … [Read more...]

Canada and the U.K. hit by Ramnit Trojan in new malvertising campaign

By Jérôme Segura Figure1: Pop-under advert fires up RIG EK (blocked by Malwarebytes) The first stage redirection includes a link to within two different JavaScript snippets. This Traffic Distribution System (TDS) mostly loads benign adult portals/offers via ExoClick. The actual malvertising incident takes place next with a 302 redirect to a malicious TDS this time, which performs … [Read more...]

Integrate Everywhere with

By Diane Garey Successful vulnerability management (VM) programs aren't isolated programs. Successful ones include active participants from multiple teams who can share data and results with each other, so that everyone benefits from greater visibility, automation and control. And while in the past VM providers haven't made their products easy to integrate with, that changes with™. We … [Read more...]