Malware

Malware | News, how-tos, features, reviews, and videos

cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px
Ransomware  >  A coin-operated lock ransoming an encrypted system.

ransomware breach hackers dark web

Egregor ransomware takes a hit after arrests in Ukraine

Ukrainian, French and US operation targets ransomware group members and takes down its infrastructure.

Ransomware  >  A masked criminal ransoms data for payment.

CSO's guide to the worst and most notable ransomware

The ransomware gangs and their malware listed here have victimized millions of companies and caused billions of dollars in costs.

locked data / bitcoins

How ransomware negotiations work

Here's what experienced negotiators say your organization should expect if it ever needs to pay a ransomware demand.

spider dark web bug virus poisonous threat weave pattern by steve norris getty

Sprite Spider emerging as one of the most destructive ransomware threat actors

Having flown under the radar for several years, the Sprite Spider group is using a ransomware code suite that is effective and hard to detect.

Botnet Trouble / Botnet army

TrickBot returns with campaign against legal and insurance firms

The new iteration of the TrickBot botnet, which had enabled Ryuk and other ransomware attacks, uses malicious links in emails rather than rogue email attachments.

CSO  >  Botnets

Law enforcement takes over Emotet, one of the biggest botnets

Multi-national cooperation removes this key malware delivery service as a threat, at least temporarily.

ransomware attack

New Intel CPU-level threat detection capabilities target ransomware

The new capabilities in the Intel mobile processors will make it harder for ransomware to avoid detection.

trojan horse malware virus binary by v graphix getty

17 types of Trojans and how to defend against them

Trojan malware comes in many different types, but all require a user action to initiate.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

cso security malware breach hack alert gettyimages 1144604134 by solarseven 2400x1600px

How to block malicious JavaScript files in Windows environments

Attackers frequently send malicious JavaScript files through bogus emails. It's easy to block these files from reaching a hapless user. Here's how.

malvertising malware hacked ads advertising online

What is malvertising? And how to protect against it

Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems.

A network of linked question marks.

6 board of directors security concerns every CISO should be prepared to address

The COVID pandemic and spike in cybercriminal activity has raised interest in security among corporate boards. These are the concerns and questions CISOs say they are now hearing from them.

trojan horse malware virus binary by v graphix getty

TrickBot explained: A multi-purpose crimeware tool that haunted businesses for years

TrickBot is one of the longest-lived botnets on the internet and represents a major threat to businesses and other organizations because it serves as a distribution platform for the infamous Ryuk ransomware and other threat actors.

medical network h/ ealthcare IoT / hospital connections and communications

Publicly known support credentials expose GE Healthcare imaging devices to hacking

The vulnerability gives hackers a means to access sensitive data, execute malicious code on devices and impact their operation.

Declining line graph / decreasing trend chart showing impact of the virus

Top 4 security trends to watch for 2021

Bad news: Ransomware becomes a bigger threat, and it becomes harder to find security talent. Good news: CISOs gain clout, and security infrastructure will improve.

Malware alert  >  United States Capitol Building

TrickBot gets new UEFI attack capability that makes recovery incredibly hard

Researchers discover a new TrickBot module that allows malware to persist even after reformatting or replacing a hard drive.

cubes - blocks - squares - containers - storage - repository

Half of all Docker Hub images have at least one critical vulnerability

New research reveals the scale at which criminals have exploited public open-source Docker repositories to plant malware among container images.

Computerworld Cheat Sheet  >  Microsoft Excel 2016

Why Excel 4.0 macro exploits are surging

Researchers discover progressively complex and effective XL4 attacks that take advantage of the many organizations that still rely on the old functionality.

Load More