article thumbnail

New Malware Targets 97 Browser Variants, 76 Crypto Wallets & 19 Password Managers

Tech Republic Security

Learn how the Meduza Stealer malware works, what it targets and how to protect your company from this cybersecurity threat. The post New Malware Targets 97 Browser Variants, 76 Crypto Wallets & 19 Password Managers appeared first on TechRepublic.

Malware 517
article thumbnail

Kaspersky uncovers fileless malware inside Windows event logs

Tech Republic Security

The cybersecurity company says this is the first time they have seen this type of malware hiding method. The post Kaspersky uncovers fileless malware inside Windows event logs appeared first on TechRepublic.

Malware 491
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical vulnerability in AMI MegaRAC BMC allows server takeover

Network World

Continue reading on CSOonline.

Malware 269
article thumbnail

Fortinet extends AI support to network threat detection, cloud workflow

Network World

The company is adding new components to Fortinet Advisor (FortiAI), its natural language, AI-based security assistant that promises to help customers better handle security operations and network management. Lacework helps customers manage and secure cloud workflows.

Network 488
article thumbnail

Morphisec is using the Windows 10 transition to help companies boost security

Tech Republic Security

Morphisec combines the anti-virus protection in the new Microsoft OS with its own defenses against malware.

Malware 497
article thumbnail

New Android malware found every 10 seconds, report says

Tech Republic Security

A report from security company G DATA said that 8,400 new Android malware samples are discovered every day, stemming from the fragmentation issues with the OS.

Malware 346
article thumbnail

Ask.com serves as a conduit for malware - again

Network World

In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates. To read this article in full or to leave a comment, please click here

Malware 369