Top

Category: Virus & Malware


Network security, Security, Threats & Malware, Virus & Malware

NXM Autonomous Security platform protects space infrastructure and IoT devices from cyberattacks

July 1, 2022

Via: Help Net Security

NXM Labs unveiled its NXM Autonomous Security platform that prevents hackers from gaining unauthorized access to commercial, industrial, medical, or consumer internet of things (IoT) devices. Tested in collaboration with the Jet Propulsion Laboratory (JPL), California Institute of Technology (Caltech), […]


Email security, Security, Threats & Malware, Virus & Malware

Product showcase: Group-IB Unified Risk Platform

July 1, 2022

Via: Help Net Security

The cyber threat landscape has intensified. Threat actors are organized and professionalized, with ransomware gangs outsourcing the first step of their operations to Initial Access Brokers. This alliance has proven profitable for both sides, as the illegal sale of initial […]


Threats & Malware, Virus & Malware

G-Core Labs’ stand-alone solution offers protection against SYN Flood DDoS attacks

June 30, 2022

Via: Help Net Security

Developed in partnership with Intel, the XDP-based solution removes the need for a dedicated DDoS protection server role. An SYN Flood is a type of DDoS (Denial of Service) attack that is designed to make an online network or system […]


Threats & Malware, Virus & Malware, Vulnerabilities

EMEA continues to be a hotspot for malware threats

June 30, 2022

Via: Help Net Security

Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the WatchGuard Threat Lab. Researchers also found that the Emotet botnet came back in a […]


Threats & Malware, Virus & Malware

Hermit spyware is deployed with the help of a victim’s ISP

June 29, 2022

Via: Malwarebytes

Google’s Threat Analysis Group (TAG) has revealed a sophisticated spyware activity involving ISPs (internet service providers) aiding in downloading powerful commercial spyware onto users’ mobile devices. The spyware, dubbed Hermit, is reported to have government clients much like Pegasus. Italian […]


Threats & Malware, Virus & Malware

Linux Malware Deemed ‘Nearly Impossible’ to Detect

June 14, 2022

Via: Threat Post

A new Linux malware that’s “nearly impossible to detect” can harvest credentials and gives attackers remote access and rootkit functionality by acting in a parasitic way to infect targets, researchers said. Researchers from The BlackBerry Research and Intelligence Team have […]


Threats & Malware, Virus & Malware

This devious ransomware is now more dangerous than ever

June 13, 2022

Via: TechRadar

With new obfuscation techniques, and attack capabilities, the Hello XD ransomware(opens in new tab) is now more dangerous than ever before, Unit 42, Palo Alto Networks’ cybersecurity arm, has found. The group discovered Hello XD now features a new encryptor […]


Threats & Malware, Virus & Malware

Researchers unearth highly evasive “parasitic” Linux malware

June 10, 2022

Via: Help Net Security

Security researchers at Intezer and BlackBerry have documented Symbiote, a wholly unique, multi-purpose piece of Linux malware that is nearly impossible to detect. “What makes Symbiote different from other Linux malware that we usually come across, is that it needs […]


Threats & Malware, Virus & Malware

11 infamous malware attacks: The first and the worst

June 9, 2022

Via: CSO Online

Viruses and other malware spreading for sinister or baffling reasons has been a staple of cyberpunk novels and real-life news stories alike for decades. And in truth, there have been computer viruses on the internet since before it was the […]


Threats & Malware, Virus & Malware

Ransomware attacks setting new records

June 7, 2022

Via: Help Net Security

Zscaler released the findings of its annual ThreatLabz Ransomware Report, which revealed an 80 percent increase in ransomware attacks year-over-year. In 2022, the most prevalent ransomware trends include double-extortion, supply chain attacks, ransomware-as-a-service, ransomware rebranding, and geo-political incited ransomware attacks. […]