Malware

Malware news, analysis, research, how-to, opinion, and video.

security risk - phishing / malware / social engineering
virtual transactions - digital money - cryptocurrency - blockchain

2 linux malware scarier

GoScanSSH malware targets Linux systems but avoids government servers

A new strain of malware aimed at Linux-based SSH servers is actively trying to avoid infecting government or military systems.

computer keyboard delete trash

SamSam group deletes Atlanta's contact portal after the address goes public

An image shared with local media during the early stages of a SamSam ransomware infection in Atlanta exposed the contact portal assigned to the city by the group responsible for the attack. When questioned about their actions via the...

ransomware at your service 4

SamSam ransomware attacks have earned nearly $850,000

First emerging in late 2015, the group believed to be responsible for the SamSam ransomware family has targeted small and large businesses, healthcare, governments, and education. To date, the group has made nearly $850,000 USD

location symantec headquarters exterior 300dpi

Symantec: Diverse threats remain a consistent problem online

A report published this evening by Symantec outlines the rocky year consumers and business owners had online in 2017, covering everything from coin mining attacks, problems in the supply chain, ransomware, BEC attacks, and more.

lmt booth mwc 2018

Latvian mobile operator invites cyber attackers to have a go

Security researchers wanting to test the kind of malware that could break public networks now have a place to do so in safety.

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

pirate flag pirates piracy

Flight simulator add-on used malware to steal pirates' passwords

Gamers are not happy that Flight Sim Labs added malware to the A320-X flight simulator add-on -- meant to be used with Microsoft Flight Simulator X and Prepar3D 3.0 -- in an effort to stop software pirates.

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain

Hackers exploit Jenkins servers, make $3 million by mining Monero

Hackers exploiting Jenkins servers made $3 million in one of the biggest malicious cryptocurrency mining operations ever.

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

domain name systems dns

Experts are predicting automated lateralization attacks against Windows domains

Here’s how to prepare...

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ransomware data laptop

Hackers lure victims with fake cryptocurrency SpriteCoin

Beware of the SpriteCoin double whammy: The fake cryptocurrency installs ransomware and more malware if the ransom is paid.

security training ts

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

Load More