IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

malware

Akamai to acquire cyber security firm Guardicore
Akamai building with logo
Acquisition

Akamai to acquire cyber security firm Guardicore

Guardicore’s micro-segmentation solution will add to Akamai’s Zero Trust Security portfolio
29 Sep 2021
Two-thirds of organizations have fallen victim to ransomware
Visual representation of ransomware by showing encrypted files on a display
ransomware

Two-thirds of organizations have fallen victim to ransomware

New report finds ransomware attacks grew by over 1,000%
29 Sep 2021
Malware developers create malformed code signatures to avoid detection
Malware in code
malware

Malware developers create malformed code signatures to avoid detection

Google researchers uncovers technique used to push dodgy software onto unsuspecting victims
24 Sep 2021
CISA, FBI, and NSA issue a Conti ransomware advisory
FBI, DOJ badge on a crest
ransomware

CISA, FBI, and NSA issue a Conti ransomware advisory

Joint statement with the FBI and the NSA warns of increased attacks from the Conti Ransomware
23 Sep 2021
Researchers disclose top flaws abused by ransomware gangs
Ransomware on a red screen
ransomware

Researchers disclose top flaws abused by ransomware gangs

Easy-to-follow list may give organizations time to prepare for ransomware attacks
20 Sep 2021
Ransomware hackers break off from Babuk to join a new group
Ransomware message on a computer screen
ransomware

Ransomware hackers break off from Babuk to join a new group

New research shines a light on the fallout between criminals in the wake of the Colonial Pipeline attack
9 Sep 2021
Ragnar Locker vows to leak data if victim contacts the police
Visual representation of ransomware by showing encrypted files on a display
ransomware

Ragnar Locker vows to leak data if victim contacts the police

The ransomware gang said victims hiring "professional negotiators" are making the recovery process worse
7 Sep 2021
Large US businesses are hackers' ideal ransomware targets
Computer virus transfer into a desktop PC by internet LAN line
ransomware

Large US businesses are hackers' ideal ransomware targets

Research into dark web ads finds organizations in English-speaking countries are top targets
7 Sep 2021
Hackers use WebSVN to deploy new Mirai malware
Malware in code
malware

Hackers use WebSVN to deploy new Mirai malware

Attackers used the notorious malware to perform distributed denial of service attacks
31 Aug 2021
Bahrain targets activists with NSO's Pegasus spyware
Computer code on a screen with a skull representing a computer virus / malware attack.
spyware

Bahrain targets activists with NSO's Pegasus spyware

The spyware reportedly employed two exploits targeting Apple's iMessage system
24 Aug 2021
Modified PRISM backdoor used in new attacks
A person on a laptop to depict hacking
malware

Modified PRISM backdoor used in new attacks

Linux ELF executables used to avoid detection by antivirus products.
23 Aug 2021
Criminals caught trying to recruit insiders to plant ransomware
Ransomware on a red screen
ransomware

Criminals caught trying to recruit insiders to plant ransomware

Employees offered cut of proceeds if they deploy DemonWare on their behalf
20 Aug 2021
New Adload malware bypasses Apple’s XProtect to infect macOS devices
"Adware" within a series of binary coding
adware

New Adload malware bypasses Apple’s XProtect to infect macOS devices

Old malware retooled to evade Apple defenses
12 Aug 2021
Hackers turn to Prometheus to deliver ransomware threats to victims
RAnsomware message on a computer screen with person sitting in front of it
ransomware

Hackers turn to Prometheus to deliver ransomware threats to victims

Campo Loader, IcedID, QBot, SocGholish, and Buer Loader all served up ransomware attacks on US government agencies.
6 Aug 2021
CISA warns of disguised malware on hacked Pulse Secure devices
Red skull and crossbones atop binary code
malware

CISA warns of disguised malware on hacked Pulse Secure devices

CISA lists several tasks administrators can complete to boost security
22 Jul 2021
The five essentials from your endpoint security partner
Five essentials from your endpoint security partner - title against a background of blue circles - whitepaper from Malwarebyteswhitepaper
Whitepaper

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently
22 Jul 2021
New malware uses search engine ads to target pirate gamers
Skull and crossbones on a computerized background
malware

New malware uses search engine ads to target pirate gamers

MosaicLoader uses advanced obfuscation techniques to avoid detection
21 Jul 2021
Hackers abuse single bit change in Intel CPU register to evade detection
Macro view of modern multicore CPU processor in human hand with PC computer motherboard in background
malware

Hackers abuse single bit change in Intel CPU register to evade detection

Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed
20 Jul 2021
84% of organizations experienced phishing or ransomware attacks in the last year
Padlock being lifted by a fishing hook on a blue background to symbolise phishing attacks
ransomware

84% of organizations experienced phishing or ransomware attacks in the last year

New research finds half of US firms are not effective in countering cyber threats
12 Jul 2021
Maryland water company investigating ransomware attack
Overhead photograph of a water treatment plant
ransomware

Maryland water company investigating ransomware attack

The attack on WSSC Water affected non-essential business systems
28 Jun 2021
Your essential guide to internet security
Abstract cyber security image of a man holding a symbol of a padlock inside a shield
Security

Your essential guide to internet security

We explain how to ensure both you and your business remain safe online
25 Jun 2021
Ransomware criminals look to other hackers to provide them with network access
Ransomware on a red screen
ransomware

Ransomware criminals look to other hackers to provide them with network access

New report finds ransomware gangs are buying access from hackers planting backdoors
17 Jun 2021
FBI still frowns on ransomware payments
FBI, DOJ badge on a crest
ransomware

FBI still frowns on ransomware payments

Even though major companies are paying millions in ransom, the FBI’s policy hasn’t changed
11 Jun 2021
Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw
Skull depicted in code
zero-day exploit

Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw

Chain of vulnerabilities used to attack multiple companies worldwide
9 Jun 2021