Infosec News

Hello All. Most of you know who Malwarebytes is, endpoint product used to protect against malware. Many in the industry say is one of the best consumer products our there when compared to others like McAfee or Norton. In some unfortunate news, it looks like they may have suffered a cyber-breach similar in nature to that of the SolarWinds attack.

“Malwarebytes said its intrusion is not related to the SolarWinds supply chain incident since the company doesn’t use any of SolarWinds software in its internal network. Instead, the security firm said the hackers breached its internal systems by exploiting an Azure Active Directory weakness and abusing malicious Office 365 applications. Malwarebytes said it learned of the intrusion from the Microsoft Security Response Center (MSRC) on December 15. At the time, Microsoft was auditing its Office 365 and Azure infrastructures for signs of malicious apps created by the SolarWinds hackers, also known in cyber-security circles as UNC2452 or Dark Halo.”

“After an extensive investigation, we determined the attacker only gained access to a limited subset of internal company emails,” said Marcin Kleczynski, Malwarebytes co-founder and CEO.

Given the same threat actor that breached SolarWinds moved to weaponize the company’s software by inserting the Sunburst malware into some updates for the SolarWinds Orion platform, Malwarebytes has indicated that they have also performed a very thorough audit of all their products and associated source code, searching for any signs of a similar compromise or past supply chain attack.

“Our internal systems showed no evidence of unauthorized access or compromise in any on-premises and production environments. Our software remains safe to use,” Kleczynski added.

To read the statement from Marcin Kleczynski – visit

Read more

Hello All. Recall all the days of having to deal with Adobe Flash-based attacks? Arbitrary code execution flaws? Users not always updating their devices to the most recent version of software right away, leaving them susceptible to the thousands of known vulnerabilities. How about exploit kits that took advantage of vulnerabilities in Flash – for example, a hacker may decide to use an exploit kit delivered by website redirect. That means, when a user clicks on a website link in their browser, an embedded script redirects the user to a hacker’s landing page that contains the exploit kit. Remember a few years ago when an unpatched bug in Adobe Flash was being targeted by the Angler Exploit Kit – causing all kinds of ransomware hits?

Well, I am happy to say we can put all of that behind us. Adobe Flash Player is officially non-functional, and it’s time to uninstall the program once and for all. In a coordinated announcement from Adobe, Apple, Microsoft, Google, and Mozilla in July 2017. we learned that Adobe Flash Player would officially reach the end of life on December 31st, 2020.

When Adobe released their final version of Flash Player in December, they also announced that recent versions of the software include a kill switch that prevents Flash Player from loading Flash content starting on January 12th, 2021.

It is now January 14th, and as Flash content no longer runs in Flash Player, it is time to uninstall the software. Now, when you try to open Flash content, which most browsers automatically block by default, Flash player will display the following icon that opens the when you click on it.

Read more