-
Take back control of your browser—Malwarebytes Browser Guard now blocks search hijacking attempts
Search hijacking, often referred to as browser hijacking, occurs when cybercriminals modify users’ browser settings without their consent. This often results in users being redirected to potentially malicious websites, such as fake customer service offerings. Search hijacking commonly happens through free downloads, bundled software, or fake browser extensions that pose as helpful tools. These attacks can…
-
Deepfake-posting man faces huge $450,000 fine
A man is facing a $450,000 AU fine after he published deepfake images of prominent Australian women on the now-defunct MrDeepfakes web site. That’s if Australia’s online safety regulator gets its way. Anthony Rotondo faces charges of posting these and other explicit deepfake images to the MrDeepfakes website, which closed down earlier this month. According…
-
Fake AI video generator tools lure in Facebook and LinkedIn users to deliver malware
Cybercriminals are taking advantage of the public’s interest in Artificial Intelligence (AI) and delivering malware via text-to-video tools. According to researchers at Mandiant, the criminals are setting up websites claiming to offer “AI video generator” services, and then using those fake tools to distribute information stealers, Trojans, and backdoors. Links to the malicious websites were…
-
New warning issued over toll fee scams
Over a year ago the FBI warned about what was then a new form of smishing (phishing via SMS) scam: text messages that demanded payment for toll fees. The FTC sent out a similar warning in January, 2025. Then, in April another wave of toll fee scams began doing the rounds. Now the Departments of…
-
184 million logins for Instagram, Roblox, Facebook, Snapchat, and more exposed online
A recent discovery by cybersecurity researcher Jeremiah Fowler of an unsecured database containing over 184 million unique login credentials has once again highlighted the growing threat posed by infostealers. While the sheer volume of exposed data—including emails, passwords, and authorization URLs—is alarming, the real concern is not just about the exposure itself, but in how…
-
A week in security (May 19 – May 25)
Last week on Malwarebytes Labs: Lumma information stealer infrastructure disrupted Stalkerware apps go dark after data breach Scammers are using AI to impersonate senior officials, warns FBI 23andMe and its customers’ genetic data bought by a pharmaceutical org Malware-infected printer delivered something extra to Windows users How Los Angeles banned smartphones in schools (Lock and…
-
GenAI’s Impact — Surging Adoption and Rising Risks in 2025
In 2025, GenAI has moved from experimental to enterprise-critical — transforming how organizations innovate, operate, and protect data. We’ve entered a new age, one where technology isn’t just evolving—it’s transforming at warp speed. At the heart of this revolution lies generative AI (GenAI), a force rapidly reshaping organizations across every conceivable sector. While this transformative…
-
Cybersecurity Challenges in the Energy and Utilities Sector
How to Protect Critical Infrastructure Today, While Securing Tomorrow The energy and utilities sectors must quickly find answers and respond to a vital question – how can we address the emerging cybersecurity challenges that threaten national (and international) operations and services? Organisations are under increasing pressure, as they are expected to deliver uninterrupted services and…
-
Improving National Security Through Secure AI
When I began my career as a Special Agent with the Air Force Office of Special Investigations, I witnessed firsthand how policymakers initially approached national security issues related to cyberattacks. They often took an ‘as needed’ approach to incidents, like ransomware attacks, disrupted public infrastructure, or theft of intellectual property. Fast forward to today –…
-
Cortex XDR Named 2025 Gartner Customers’ Choice for Endpoint Security
Highest Willingness to Recommend Score of All Gartner Customers’ Choice Vendors For cybersecurity professionals evaluating new technologies, there’s nothing more illuminating than the real-world experiences of peers who defend against threats every single day. The 2025 Gartner® Peer Insights™ Voice of Customer Report captures this practical reality with insight spanning hundreds of companies worldwide. In…