Malware

Malware | News, how-tos, features, reviews, and videos

digital fingerprint / binary code
hacker / cryptocurrency attack

A hook is cast at laptop email with fishing lures amid abstract data.

Attackers phish Office 365 users with fake voicemail messages

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.

Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

8 questions to answer before paying a ransomware demand

Consider these factors before deciding to pay a ransom after a ransomware attack. Better yet, know where you stand before one hits you.

cryptojacking / cryptocurrency attack

Cryptojacking worm infects exposed Docker deployments

Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers.

CSO  >  ransomware / security threat

GandCrab cousin Sodinokibi made a fortune for ransomware pushers

By tracking down bitcoin wallets, researchers estimate that the Sodinokibi creators pocketed at least $4.5 million.

virus specimen / world map / binary code

Best antivirus software: 12 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

01 atm skimmer

Cobalt cybercrime group might be launching Magecart skimming attacks

Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain.

cybersecurity eye with binary face recognition abstract eye

Cyber-risk management is about to get easier

New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.

online shopping cart magecart hackers shopping online

Magecart web skimming group targets public hotspots and mobile users

IBM researchers discover new Magecart scripts suggest planned advertisement injection through Wi-Fi and supply chain attacks.

Botnet Trouble / Botnet army

Secrets of latest Smominru botnet variant revealed in new attack

Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack.

vmware vmworld sharpen focus

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

detection radar computer bug threats identify breach  by the lightwriter kao studio getty

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

computer infection spreading

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.

black hat / hacker / spotlight / binary overlay

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

hacked computer security symbol   hacked rot

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.

virus specimen / world map / binary code

Hunting vintage MS-DOS viruses from Cuba to Pakistan

Security researchers and enthusiasts try to understand and preserve the history of malware.

Load More