Malwarebytes Breach Remediation 2.6.0.1270 Beta Homepage: * https://www.malwarebytes.org/business/breachremediation/ * https://forums.malwarebytes.org/index.php?/topic/179168-malwarebytes-breach-remediation-v26-beta/ Download: * https://malwarebytes.box.com/MBBR
I don't know, but MBAM already exists for businesses, both as standalone in Malwarebytes Anti-Malware for Business and as a part of Malwarebytes Endpoint Security.
Malwarebytes digging his own grave, they promise too much and they release too much useless tools which could be done with only one single tool - with different business models. They should focus and concentrate on one or two products. I guess to release one tool and allow addons/extensions/plugins with other licenses would be the best so everyone would be satisfied. In general this isn't a bad idea but in fact most companies I saw doing this (e.g. like google) very fast closing such projects because lack of interest and people staying on well known tools.
Simply making money. Ransomeware hype is something to get more, as always play with the fear of people.
I love the concept of MBBR. Currently building up a project to present it to my company's security team and will see if I can get it implemented. I have tons of ideas on how it can be used, can't wait to get to the testing part! Also, "lol" at thinking that Malwarebytes' focus is only money... You should really take another look at the company if this is what you believe.
Or maybe protecting MBAM users in case signature coverage is not adequate enough to detect all new ransomware samples?
I have to disagree! Ransomware is not a hype, but a very serious threat, for home users and companies.
Okay, so I know that AV company hype is usually exaggerated, but this is taking things quite far IMO, even for hype. My guess: product reaches market, time goes by, blackhats keep the advantage, nothing changes. Product becomes one of a crowd, and eventually slides into obscurity in favor of some other new product.
This is implying the perfect security exists, and we all know it doesn't. Also, no matter how much security you have, if the user lets something malicious go through on his own accord, there's nothing that can stop this from happening.
If an attacker want to attack you then it's matter of effort he want to spent to hack you, I guess this is known and ransomeware exists since 2009 or earlier, so nothing new. Using tools is false sense of security because you think you're protected but in fact that doesn't prevent anything because you and the tools aren't fail-safe which means it's always possible that you anyway get infected. Especially with faked AV's or tools which saying, download me and I fix your pc. This is usually how the infection starts. The risk is much higher to get infected if you download something as not to download something and just read how to protect, wouldn't you agree? The mechanism how to stop such stuff directly on OS is already mentioned several times by not working with admin account, not download email attachments and and and. This has nothing much to do with be an expert or not, especially because this is available since Vista and with some effort even earlier. If your working with backups like in most business environments I know I see no problem, but the question also is if you inform your workers to not click on everything and show them what to do and what they better should avoid, I guess this is the bigger weakness because most ignore these things and better use some tools. I think in general the IT should do a lot of more effort to inform people instead of re-spelling over and over again to install xay. It simply not works as shown now for 25 years.
We're talking about MBBR here, which like the name indicates, is a remediation tool, not a prevention tool. So that argument doesn't apply here. Because you think it's easy to do this in a company? Same as above: you think it's easy to ask over 3,000 employees to not do this, not do that, be careful of this, be careful of that, when most of them doesn't possess the kind of knowledge we do (or me and my peers in IT do)? I think you missed the point that MBBR is destined to companies, not home users. There's plenty of other remediation tools that exists, what's wrong with Malwarebytes coming up with their own?
Please re-read the features list, it also comes with heuristic and detectable features so I guess this is okay, because it also can a little bit prevent this, so my argument seems okay. It's easy to use existent videos and link them to 3k, 5k or 100k employees I see no problem youtube e.g. works like this. No I not miss that point that we are here not at a home level, but that is not an excuse to not inform your workers about such threats. Yes you got the point there exist already tools, and all for free so I not need another one and so not any company especially not in a beta stage. The thing is we doing there work, by testing and report and submitting samples and wasting our energy for nothing, on other forums/manufacturer you get a free license or other gimmicks which would be a win-win situation for everyone but here you get no benefit of testing something. Of course a beta is always opt-in I know about this.
You're assuming that employees will understand everything they need to do and recognize something like phishing emails and infected attachments naturally after that. It doesn't work like that sadly. It isn't an excuse for that no, but discrediting a remediation tool because it provides a "false sense of security" is. What sense of security will a remedition provide when you already know that you are infected, and therefore not safe anymore? ... Do you think that entreprise-grade, large-scale remediation tools are free?