Malware
Discover expert analysis on malware with news, features and insights from the team at IT Pro.
-
North Korean hackers are duping freelance developers in a fake interview attack campaignNews A fake interview process uses coding tests and repo downloads to deliver malware
By Emma Woollacott Published
News -
Axios npm compromise highlights growing software supply chain risks, experts warnNews Cyber criminals exploited a hijacked maintainer account to compromise one of the world's most widely used JavaScript libraries
By Emma Woollacott Published
News -
What is the Log4Shell vulnerability?In-depth The critical flaw affecting products built using Java is set to cause headaches in the enterprise for some time to come
By Connor Jones Last updated
In-depth -
Security experts weigh in on motivation behind Stryker cyber attackNews The attack on medical tech company Stryker has severely impacted operations globally
By Ross Kelly Published
News -
Thousands of Asus routers are being used to fuel a massive cyber crime spreeNews Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool
By Nicole Kobie Published
News -
Cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
By Emma Woollacott Published
News -
DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costsNews While these malware campaigns are very basic, researchers noted “they still work”
By Ross Kelly Published
News -
Hackers are pouncing on enterprise weak spots as AI expands attack surfacesNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
By Ross Kelly Published
News -
Google says hacker groups are using Gemini to augment attacksNews Google Threat Intelligence Group has shut down repeated attempts to misuse the Gemini model family
By Rory Bathgate Published
News -
CISA issues alert as China-linked hackers exploit Brickstorm malware to target VMware serversNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
By Emma Woollacott Published
News -
The most prominent infostealers and how businesses can protect against themIn-depth What are the most prominent infostealers of 2025 , how is the malware evolving, and how can you protect your business?
By Kate O'Flaherty Published
In-depth -
The Scattered Lapsus$ Hunters group is targeting Zendesk customersNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
By Emma Woollacott Published
News