article thumbnail

A whirlwind adventure: Malwarebytes' 15-year journey in business cybersecurity

Malwarebytes

Act I: Humble Beginnings (2008 - 2012) In the late 2000s, Malwarebytes tiptoed into the business sector with corporate licensing for its consumer anti-malware product. Malwarebytes added a DNS/Web Content Filtering Module and a Cloud Storage Scanning Module to the mix, rounding off a delectable buffet of cybersecurity enhancements.

article thumbnail

Indicators of compromise (IOCs): how we collect and use them

SecureList

What is cyber threat intelligence, and how do we use it in GReAT? This is what we call cyber threat intelligence. It also requires a large and representative set of knowledge about cyberattacks, threat actors and associated tools over an extended timeframe. But why are we offering cyber threat intelligence at all?