A week in security (February 23 – March 1)
Malwarebytes Unpacked
2026-03-02 16:01:00
收藏
Last week on Malwarebytes Labs:
- Public Google API keys can be used to expose Gemini AI data
- Inside a fake Google security check that becomes a browser RAT
- Fake Zoom and Google Meet scams install Teramind: A technical deep dive
- How to understand and avoid Advanced Persistent Threats
- The Conduent breach; from 10 million to 25 million (and counting)
- Instagram flagged explicit messages to minors in 2018. Image-blurring arrived six years later
- Developer creates app to detect nearby smart glasses
- Reddit, porn sites fined by UK regulators over children’s safety and privacy
- Roblox gives predators “powerful tools” to target children, says LA County
- Fake Zoom meeting “update” silently installs unauthorized version of monitoring tool abused by cybercriminals to spy on victims
- Refund scam impersonates Avast to harvest credit card details
- OpenClaw: What is it and can you use it safely?
- Password managers keep your passwords safe, unless…
- Fake Huorong security site infects users with ValleyRAT
- What can’t you say on TikTok?
Stay safe!
We don’t just report on threats—we remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.
目录
最新
- Fake Claude site installs malware that gives attackers access to your computer
- This fake Windows support website delivers password-stealing malware
- Malwarebytes Privacy VPN receives full third-party audit
- Wikipedia’s AI agent row likely just the beginning of the bot-ocalypse
- Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka
- FBI, CISA warn of Russian hackers hijacking Signal and WhatsApp accounts
- Hacked sites deliver Vidar infostealer to Windows users
- March 2026 Patch Tuesday fixes two zero-day vulnerabilities