Techday Network
Sign in
Sign up
Australia's leading source of security and threat news
Results:
Malware
These search results are from across the Techday network of sites
2019 threat landscape predictions - Proofpoint
Proofpoint researchers have looked ahead at the trends and events likely to shape the threat landscape in the year to come.
Mac malware on WatchGuard’s top ten list for first time
The report is based on data from active WatchGuard Firebox unified threat management appliances and covers the major malware campaigns.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
CERT NZ highlights rise of unauthorised access incidents
“In one case, the attacker gained access and tracked the business’s emails for at least six months. They gathered extensive knowledge of the business’s billing cycles."
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.
DanaBot banking Trojan: How to protect your organisation
DanaBot is a Trojan written in the Delphi programming language that includes banking site web injections and stealer functions.
FBI disrupts multiple botnets as part of anti-fraud operation
Ad fraud ring 3eve used botnets to generate nearly 30 million dollars in fraudulent ad revenue.
A clear case for AI in endpoint protection
Today, AV has an alternative, and it is Artificial Intelligence (AI).
WatchGuard’s eight (terrifying) 2019 security predictions
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
Financial services breaches nearly triple in two years - Bitglass
“Financial organisations regularly handle sensitive, regulated data like home addresses, bank statements and Social Security numbers.”
Remote administration tools bring unexpected threats to industrial networks
According to a report published by Kaspersky Lab ICS CERT, RATs are incredibly widespread across all industries.
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
Exclusive: How companies can stay secure in the cloud
"Organisations moving to the cloud must defend against malware that can infect a business by spreading through personal and corporate devices."
Botnet activity spreading multi-purpose malware tools
Cybercriminals who use botnets to conduct their attacks are shifting away from single-purpose malware .
Cryptomining and IoT attacks gunning for healthcare industry
Medical staff now carry multiple connected devices with them, including personal devices that lack appropriate security controls.
Hackers using spearphishing to target banks –Bitdefender
To limit the risk of being discovered, attackers operated outside of normal business hours and cashout operations were planned for weekends.
Deep dive: Research finds new links among North Korea’s malware families
By identifying reused code, researchers gained valuable insights about the “ancestral relations” to known threat actors or other campaigns.
Something old, nothing new: Cybercrims still rely on spam
The probability of a recipient opening an email increases 12% if the email claims to come from a known individual.
Criminals aim for attack 'quality, not quantity' as malware volumes drop
The crime lull may be a continuation of Q1’s drop, but cryptominers, ransomware, and exploits have opted for ‘quality, not quantity’.
1
2
3
4
5
…
Next ›
Last »