Malware

CONFERENCE REPORT

RSA Conference Rebounds as Business Risks Soar

Like a persistent piece of malware that your antivirus product just can't seem to eradicate, the annual RSA cybersecurity conference was back with a vengeance this year. But while the malware example is inherently malicious, the industry event seemed to be bustling with goodwill and a positive messa...

New cyber research connects the infamous North Korea-aligned Lazarus Group behind the Linux malware attack called Operation DreamJob to the 3CX supply-chain attack

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices

Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services

Apply these tips to prevent bad actors from using your IP address to load malware onto your devices, serve you with ransomware, hack into your financial accounts, or steal your entire online identity

2023 might be a volatile year for cybersecurity officers as they deal with the pressures of maintaining a ridged security posture while also dodging the bullet of blame when attacks are successful

While Linux malware reached never-before-seen numbers in 2022, the total number of new malware developments among other major computing platforms fell

Distributed denial-of-service attacks continued to rise in November. A prime target was the United States, with 1,543 attacks. While "as a service" offerings have made ransomware a low-effort, low-risk option for generating criminal gains

Defenders of software supply chains have a new attack vector to worry about: machine learning models

Although small businesses lack the resources large enterprises enjoy to defend themselves online, SMBs can avoid becoming cybercrime victims by following these proven, safe computing practices

Compromised credentials provide an easy way for threat actors to get their hands on valuable data possessed by governments. Phishing attacks on civil servants jumped 30% from 2020 to 2021, with one out of every eight workers exposed to phishing threats during the period

A large-scale phishing attack built on typosquatting is targeting Windows and Android users with malware. The campaign currently underway uses more than 200 typosquatting domains that impersonate 27 brands to trick web surfers into downloading malicious software to their computers and phones.

The threat actors would frequently pose as an employee of the fictional media publication “Australian Morning News” and provide a URL to their malicious domain. If a target clicked the URL, they’d be sent to the fake news site and be served up the ScanBox malware.

Keeping safe in cyberspace is increasingly difficult as crooks try to exploit uninformed users every chance they get. Add to that, virus and malware threats are never-ending. Here are five things in your control to help keep your digital activity safe

How will consumers react to Apple's WWDC 2023 announcements?
Loading ... Loading ...

EmergTechNews Channels