
malware - News, Features, and Slideshows
malware in pictures
-
Linux malware is on the rise: 6 types of attacks to look for
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
-
New RAT malware uses sophisticated evasion techniques, leverages COVID-19 messaging
Nerbian RAT malware uses significant anti-analysis and anti-reversing capabilities along with multiple open source Go libraries to conduct malicious activity.
-
Advantage joins GCSB's Malware Free Networks programme
Managed services and security provider Advantage is now a partner of Malware Free Networks, the intelligence community's cyber threat feed.
-
Wiper malware targets Ukraine as military conflict extends into cyber space
A new data wiper malware campaign has been detected targeting organisations in Ukraine amid escalating Russian military conflict in the nation.
-
TrickBot operators slowly abandon the botnet and replace it with Emotet
Researchers believe the group behind TrickBot are moving the infected devices it controls to the newer, more difficult to detect Emotet malware.
-
Are Kiwi businesses in the dark on cyber risks?
"Experts are warning that Kiwi businesses are woefully underprepared for the increasing threat of cyber-attacks."
-
FireEye poaches Symantec and Juniper to bolster local channel ranks
“Today most organisations in the region aren’t prepared to defend themselves against advanced cyber attacks."
-
ARN Roundtable: Real Time Security - Raising Threat Intelligence
After a year of high profile hacks and security breaches overseas, it’s fast becoming fast apparent that Australia’s security market is woefully unprepared for the threats that lie in wait. What do we need to do to get up to speed?
-
Top NZ virus revealed... What's killing your company?
What's the most prevalent malware family in New Zealand, and how can Kiwi businesses avoid it?
-
Trend Micro: Malware on the rise across NZ
“Our findings confirm that we are battling rapidly moving cyber-criminals and evolving vulnerabilities simultaneously."
Whitepapers about malware
-
5 Cyberthreats that Slip Past Traditional Antivirus
Many traditional antivirus (AV) programs operate on signatures—as malicious software is discovered, a signature describing the file is generated, added to a database, then the database gets pushed out to the customer base. Signature-based AV solutions can have a hard time keeping up with this volume, often leaving devices vulnerable. Over time, we have seen the rise of new defenses; however, each defense triggers a corresponding change in tactics from the bad guys. These changes include malware designed not just to exploit vulnerabilities, but to outwit an AV’s defenses. Here are 5 types of attacks that slip past traditional antivirus.
-
Datto’s State Of The Channel Ransomware Report 2016