Malware

Malware | News, how-tos, features, reviews, and videos

Data center / enterprise networking
Ransomware  >  A coin-operated lock ransoming an encrypted system.

credit card theft / credit card fraud / credit card hack

Cybercriminals are increasingly using info-stealing malware to target victims

In the first seven months of this year, threat actors stole over 50 million passwords, 2 billion cookie files, details of 103,150 bank cards, and data from 113,204 crypto wallets. 

malvertising malware hacked ads advertising online

DUCKTAIL malware campaign targeting Facebook business and ads accounts is back

The spear phishing group has revised its tactics and is employing more sophisticated techniques and tactics based on what appears to be extensive research into Facebook business and ads management accounts.

ransomware attack

Cohesity previews AI-powered ransomware protection suite, Datahawk

Detection, data management and vaulting are all present in Cohesity’s new Datahawk SaaS application.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Flag of the European Union as part of a broken, cracked wall.

Geopolitics plays major role in cyberattacks, says EU cybersecurity agency

State-sponsored threat actors have targeted 128 government organizations in 42 countries that support Ukraine, as ransomware and DDoS rank as top forms of cyberattacks, says the EU Agency for Cybersecurity (ENISA).

diversity south africa man holding smartphone mobile technology connected by peopleimages gettyimag

Espionage campaign loads VPN spyware on Android devices via social media

Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.

global meeting conference international business

White House ransomware summit highlights need for borderless solutions

Representatives from 36 countries and the EU agree that combatting ransomware requires international collaboration but legal systems need to catch up.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

Phishing attacks increase by over 31% in third quarter: Report

Cybersecurity company Vade reports that attackers sent more than 203.9 million emails in the third quarter alone, up from 155.3 million in the prior quarter

ransomware breach hackers dark web

With Conti gone, LockBit takes lead of the ransomware threat landscape

Two new reports show LockBit is now the dominate ransomware choice thanks to a void left by Conti and updated code.

malware attack

Attackers switch to self-extracting password-protected archives to distribute email malware

This variation on an old technique does not require the victim to provide a password to execute the malware.

cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

New Chinese attack framework Alchimist serves Windows, Linux, and macOS implants

Alchimist is easy to deploy and gives attackers a large suite of functionalities with which they can wreak havoc.

A binary map of china.

China’s attack motivations, tactics, and how CISOs can mitigate threats

A Booz Allen Hamilton report outlines global cyberthreats posed by the People’s Republic of China and gives some guidance on how to counter them.

cryptojacking / cryptocurrency attack

New cryptojacking campaign exploits OneDrive vulnerability

While currently the campaign is only involved in cryptojacking, it exploits DLL sideloading, which can be used to deploy spyware or ransomware.

Eyeglasses rest on a binary field / code review / threat assessment / check vulnerabilities

North Korea’s Lazarus group uses vulnerable Dell driver to blind security solutions

This first known exploit of the Dell vulnerability might inspire other malware developers who want to avoid detection of their code.

cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

Malware builder uses fresh tactics to hit victims with Agent Tesla RAT

A new malware campaign uses the recently discovered Quantum Builder and sophisticated tactics to deliver malicious payload.

Tech Spotlight   >   Analytics [CSO]   >   An image of a bottle of poison emanating binary code.

SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware

The sophisticated campaign sends victims looking for business forms and templates to sites containing malicious files.

ransomware attack

Ransomware operators might be dropping file encryption in favor of corrupting files

Corrupting files is faster, cheaper, and less likely to be stopped by endpoint protection tools than encrypting them.

ransomware attack

Ransomware is (slightly) on the decline, cyberinsurance company says

While ransomware attacks remain highly dangerous, data from a prominent insurer suggests that their frequency and severity is beginning to decline.

Load More
You Might Also Like