Malware

Malware news, analysis, research, how-to, opinion, and video.

lmt booth mwc 2018
bunch of toy robots

pirate flag pirates piracy
By

Flight simulator add-on used malware to steal pirates' passwords

Gamers are not happy that Flight Sim Labs added malware to the A320-X flight simulator add-on -- meant to be used with Microsoft Flight Simulator X and Prepar3D 3.0 -- in an effort to stop software pirates.

abstract FinTech image of a dollar sign referencing digital transactions and potentially blockchain
By

Hackers exploit Jenkins servers, make $3 million by mining Monero

Hackers exploiting Jenkins servers made $3 million in one of the biggest malicious cryptocurrency mining operations ever.

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

network security primary2

Why it’s harder for threats to hide behavior on a corporate network

If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection is like profiling – it’s harder to hide, but it’s not foolproof either.

domain name systems dns

Experts are predicting automated lateralization attacks against Windows domains

Here’s how to prepare...

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

ransomware data laptop
By

Hackers lure victims with fake cryptocurrency SpriteCoin

Beware of the SpriteCoin double whammy: The fake cryptocurrency installs ransomware and more malware if the ransom is paid.

security training ts

Are bad analogies killing your security training program?

Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help.

Android mobile phone
By

Dark Caracal: Hacking group targets Android smartphones

An advanced persistent threat (APT) group named Dark Caracal used Android spyware to steal hundreds of gigabytes of sensitive data from more than 21 countries.

Android mobile phone
By

Skygofree: Powerful Android spyware with advanced surveillance tools

Android spyware has advanced surveillance capabilities, including turning on the mic when the victim enters specific geolocations.

world threat disaster detection doomsday
By

Mirai Okiru: New DDoS botnet targets ARC-based IoT devices

Meet Mirai Okiru and brace for the DDoS botnet targeting 'billions' of ARC-based IoT devices.

data security encryption

Cisco ETA solves one of the biggest cybersecurity problems

Cisco Encrypted Traffic Analysis (ETA), now generally available, addresses one of the biggest pain points in the cybersecurity industry — finding malware in encrypted traffic.

cybersecurity

More cybersecurity drama, but some hope for defenders in 2018

And this for the short descriptive sentence: From fileless malware attacks to attack attribution becoming more complex, 2018 won't offer less security drama. But there's still good reason for security professionals to be optimistic...

malware cybersecurity skull crossbone
By

Loapi malware capable of destroying Android phones

Kaspersky researchers discovered malware capable of cryptocurrency mining, launching DDoS attacks and so much more that it destroyed an Android phone after two days.

Load More