State of malware: 3 key findings in the latest Malwarebytes report
Tech Republic Security
FEBRUARY 16, 2021
Spyware activity spiked in 2020, and the malware-as-a-service business model got more sophisticated.
Tech Republic Security
FEBRUARY 16, 2021
Spyware activity spiked in 2020, and the malware-as-a-service business model got more sophisticated.
The Verge
JULY 19, 2021
Amazon Web Services (AWS) has banned NSO Group, the company behind the Pegasus spyware program. As the report describes it, NSO would deploy Pegasus malware through a series of malicious subdomains, exploiting security weaknesses on services like iMessage. Illustration by Alex Castro / The Verge.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
SecureWorld News
AUGUST 8, 2022
Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. The top malware strains in 2021 included remote access Trojans (RATs), banking Trojans, information stealers, and ransomware.
SecureWorld News
SEPTEMBER 28, 2020
Google has removed 17 apps from its Google Play store due to malware known as Joker. The Joker malware family is infamous for constantly targeting Android devices. A Zscaler research team has been monitoring Joker malware and notified Google of the recent uploads to the Google Play store.
SecureWorld News
NOVEMBER 2, 2022
Almost 50% of all phishing attacks in 2021 sought to steal credentials of government personnel, up from 30% in 2020. Federal, state, and local governments increased their reliance on unmanaged mobile devices at a rate of 55% from 2020 to 2021, indicating a move toward bring your own device (BYOD) to support telework.
Galido
APRIL 11, 2019
Statistics anticipate that the number of online gamers will grow over 57 million in 2020. Attackers use malware to redirect users on bogus web pages. Use Anti-Spyware. Although the market keeps growing, data breaches in digital gaming are more than the companies admit. Bugs, on the other hand, are the loopholes in gaming codes.
ForAllSecure
APRIL 26, 2023
Common Types of Cyber Attacks Common techniques that criminal hackers use to penetrate systems include social engineering, password attacks, malware, and exploitation of software vulnerabilities. Malware can be delivered through email attachments, malicious websites, or compromised software.
Let's personalize your content