Tag "Malware"

Back to homepage
Software

Cybercriminals increasingly taking aim at businesses

2018 has been the year when cryptominers first dethroned ransomware as the most prevalent threat due to a meteoric spike in Bitcoin value in late 2017, then slowly trailed off

Software

Malware Evades Detection One Step at a Time

Malicious code was lurking about in two different apps within the Google Play store, according to researchers at Trend Micro who have disclosed that they discovered a banking Trojan in what seemed

Software

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed

Industry Insights

How to Get Cybersecurity Right in 2019

For many years now, the speed of revenue growth and tooling in the cybercrime market has exceeded the rate of investment in cybersecurity. According to various estimates, the global proceeds

Software

Cryptomining Continues to Be Top Malware Threat

Enterprise organizations appear unlikely to get respite from cryptomining attacks anytime soon if new threat data from Check Point Software is any indication.For the thirteenth month in a row, attacks

Software

Cybercriminals using combination of Vidar Infostealer Malware and GandCrab Ransomware in single attack

Hearing the phrase “high-level threat intelligence”, the immediate reaction for many people would be to think of elite security analysts employed only by secretive government organisations and the world’s largest

Identity Theft

Top Five Data Breaches of 2018 in the Healthcare Sector

Over the last year, several data breaches and massive cyber attacks rocked the healthcare sector. The sector witnessed some of the its biggest breaches in 2018. Threat actors and hacker

Mobile

The new landscape of pre-installed mobile malware: malicious code within

Here’s a scary thought: Mobile devices may soon come with pre-installed malware on required system apps. While it might sound like a grim foretelling, pre-installed mobile malware is an unfortunate

Industry Insights

Airbus CyberSecurity 2019 Predictions: The World Will See Its First Cybersecurity Treaty.

Extortion Attacks On OT And IIoT Infrastructure. Prediction: Critical Infrastructure Will Be Disrupted By A Major Extortion Attack. We’ve already seen extortion-driven attacks on infrastructure such as cities and ports,

Software

Evasive Malware, Meet Evasive Phishing

In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece of malware had grown in number and sophistication—the