ThreatDown Powered by Malwarebytes
  • Nebula support
  • OneView support
  • Nebula sign in
  • OneView sign in
  • Partner Portal sign in
    • Products

    • Endpoint Detection & Response (EDR)
    • Endpoint Protection
    • Vulnerability Assessment
    • Patch Management
    • Application Block
    • DNS Filtering
    • Mobile Security
    • Services

    • Managed Detection & Response (MDR)
    • Managed Threat Hunting
    • Premium Support
    • Platforms

    • Nebula
    • Manage your organization’s endpoint security in a single-tenant console

      Nebula customer sign in >

    • OneView
    • Provides MSPs centralized visibility and management capabilities across customer sites

      OneView customer sign in >

    • Platforms

    • Endpoint Detection & Response (EDR)
    • Explore Partnerships
    • Review program benefits, innovative technology, channel first mentality

    • Managed Service Providers
    • Everything MSPs need to run their business seamlessly

    • Technology Partners
    • Explore our technology integrations

    • Resellers
    • Build growth, profitability, and customer loyalty

    • Retain and grow your business with tools, education, and support in the partner experience center.

      Sign in to PXC >

    • Threat Center
    • Learn about the latest threat news

    • Reports
    • Threat Detections
    • Executive POV
    • Glossary
    • Blog
    • Resource Center
    • Learn more about ThreatDown

    • Case Studies
    • Products & Review
    • Cybersecurity Tips & Tricks
    • Webinars
    • About Us
    • Dive into the threats that matter in the year of autonomous AI and “dark horse” ransomware.

      Download now >

    Pricing
    • Why ThreatDown

    • About Us
    • ThreatDown vs. Competition
    • Case Studies
    • ThreatDown named Product of the Year by MRG Effitas.

      Learn more >

    Get a quote
    Buy now
    Home > Blog

    ThreatDown Intelligence

    Hole

    Ransomware

    Which ports to monitor for ransomware attacks

    3 minutes

    Explained

    What is session hijacking?

    4 minutes

    Categories

    Breaches
    Product News
    Ransomware
    Threat Intelligence
    Vulnerabilities
    Ransomware review

    Ransomware

    Ransomware in December 2024—Cl0p returns

    1 minute
    Clipboard icon

    Threat Intelligence

    Clipboard hijacker tries to install a Trojan

    2 minutes
    Powershell

    Threat Intelligence

    Sysrv cryptomining botnet is still alive (and kicking out the competition)

    4 minutes
    Cleo

    Ransomware

    Cleo, the next MOVEit and GoAnywhere?

    3 minutes
    CISA

    Exploits and vulnerabilities

    Top 5 most dangerous software weaknesses in 2024

    3 minutes

    Explained

    What is Cross-Site Request Forgery (CSRF)?

    3 minutes
    patch Tuesday header

    Exploits and vulnerabilities

    December patch Tuesday fixes one actively exploited zero-day vulnerability

    1 minute
    MITRE

    Industry News

    2024 MITRE ATT&CK® Evaluation results: ThreatDown detected every step

    2 minutes

    Posts pagination

    < 1 2 3 4 5 6 … 87 >
    ThreatDown Powered by Malwarebytes

    Products & Services

    Endpoint Detection & Response
    Endpoint Protection
    Managed Detection & Response
    Pricing

    Partners

    MSP
    Resellers
    Technology Partners
    Become a Partner

    Resources

    Threat Center
    Resource Center
    Blog
    Glossary

    Managed Services Terms & Conditions

    Managed Service Teams
    MTH Service Description
    MDR Service Description

    Support

    Nebula Support
    OneView Support

    Get in Touch

    Contact Us
    Schedule a Meeting
    Request a Demo

    ThreatDown Newsletter

    Get cybersecurity news and tips from our security experts in your mailbox.

  • Legal
  • Privacy
  • Accessibility
  • Compliance Certifications
  • Vulnerability Disclosure
  • Terms of Service
  • © 2025 All Rights Reserved