Please turn JavaScript on

ThreatDown by Malwarebytes

Want to keep yourself up to date with the latest news from ThreatDown by Malwarebytes?

Subscribe using the "Follow" button below and we provide you with customized updates, via topic or tag, that get delivered to your email address, your smartphone or on your dedicated news page on follow.it.

You can unsubscribe at any time painlessly.

Title of ThreatDown by Malwarebytes: "ThreatDown by Malwarebytes - Simplified EDR and MDR for IT-Constrained Teams"

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  0.06 / day

Message History

Threats, Threat Intelligence ThreatDown has discovered a sophisticated new infection chain that installs the CastleRAT malware without leaving a trace on disk. March 10, 2026 ThreatDown Writer In a recent investigation, the ThreatDown Research team analyzed a highly sophisticated infection chain that demonstrates just how creative threat actors are becoming. Notably…

<...


Read full story

Threats, Product News Mac info stealers like AMOS and Poseidon can harvest credentials in seconds. ThreatDown delivers 100% detection against the Objective-See malware repository at just 1.7% CPU. March 5, 2026 ThreatDown Writer For a long time, Mac security lived in a comfortable gray area. macOS earned a reputation as the “safer” desktop platform. Fewer threats.


Read full story

News, Threats, Threat Intelligence The ThreatDown 2026 State of Malware report captures a unique moment of transition—when the established world of human-driven intrusion meets the emerging machine-driven future. January 28, 2026 Mark Stockley Key Takeaways Released today, the ThreatDown 2026 State of Malware report captures a unique moment…


Read full story

Threat Intelligence Gilad Maayan January 21, 2026 Gilad Maayan If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous cyberthreats today. Rootkits are a type of malware designed to stay undetected on your computer. Cybercriminals use rootkits to remotely access and control your machine…


Read full story