IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

malware

Ransomware hackers break off from Babuk to join a new group
Ransomware message on a computer screen
ransomware

Ransomware hackers break off from Babuk to join a new group

New research shines a light on the fallout between criminals in the wake of the Colonial Pipeline attack
9 Sep 2021
Ragnar Locker vows to leak data if victim contacts the police
Visual representation of ransomware by showing encrypted files on a display
ransomware

Ragnar Locker vows to leak data if victim contacts the police

The ransomware gang said victims hiring "professional negotiators" are making the recovery process worse
7 Sep 2021
Large US businesses are hackers' ideal ransomware targets
Computer virus transfer into a desktop PC by internet LAN line
ransomware

Large US businesses are hackers' ideal ransomware targets

Research into dark web ads finds organizations in English-speaking countries are top targets
7 Sep 2021
Hackers use WebSVN to deploy new Mirai malware
Malware in code
malware

Hackers use WebSVN to deploy new Mirai malware

Attackers used the notorious malware to perform distributed denial of service attacks
31 Aug 2021
Bahrain targets activists with NSO's Pegasus spyware
Computer code on a screen with a skull representing a computer virus / malware attack.
spyware

Bahrain targets activists with NSO's Pegasus spyware

The spyware reportedly employed two exploits targeting Apple's iMessage system
24 Aug 2021
Modified PRISM backdoor used in new attacks
A person on a laptop to depict hacking
malware

Modified PRISM backdoor used in new attacks

Linux ELF executables used to avoid detection by antivirus products.
23 Aug 2021
Criminals caught trying to recruit insiders to plant ransomware
Ransomware on a red screen
ransomware

Criminals caught trying to recruit insiders to plant ransomware

Employees offered cut of proceeds if they deploy DemonWare on their behalf
20 Aug 2021
New Adload malware bypasses Apple’s XProtect to infect macOS devices
"Adware" within a series of binary coding
adware

New Adload malware bypasses Apple’s XProtect to infect macOS devices

Old malware retooled to evade Apple defenses
12 Aug 2021
Hackers turn to Prometheus to deliver ransomware threats to victims
RAnsomware message on a computer screen with person sitting in front of it
ransomware

Hackers turn to Prometheus to deliver ransomware threats to victims

Campo Loader, IcedID, QBot, SocGholish, and Buer Loader all served up ransomware attacks on US government agencies.
6 Aug 2021
CISA warns of disguised malware on hacked Pulse Secure devices
Red skull and crossbones atop binary code
malware

CISA warns of disguised malware on hacked Pulse Secure devices

CISA lists several tasks administrators can complete to boost security
22 Jul 2021
The five essentials from your endpoint security partner
Five essentials from your endpoint security partner - title against a background of blue circles - whitepaper from Malwarebyteswhitepaper
Whitepaper

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently
22 Jul 2021
New malware uses search engine ads to target pirate gamers
Skull and crossbones on a computerized background
malware

New malware uses search engine ads to target pirate gamers

MosaicLoader uses advanced obfuscation techniques to avoid detection
21 Jul 2021
Hackers abuse single bit change in Intel CPU register to evade detection
Macro view of modern multicore CPU processor in human hand with PC computer motherboard in background
malware

Hackers abuse single bit change in Intel CPU register to evade detection

Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed
20 Jul 2021
84% of organizations experienced phishing or ransomware attacks in the last year
Padlock being lifted by a fishing hook on a blue background to symbolise phishing attacks
ransomware

84% of organizations experienced phishing or ransomware attacks in the last year

New research finds half of US firms are not effective in countering cyber threats
12 Jul 2021
Maryland water company investigating ransomware attack
Overhead photograph of a water treatment plant
ransomware

Maryland water company investigating ransomware attack

The attack on WSSC Water affected non-essential business systems
28 Jun 2021
Your essential guide to internet security
Abstract cyber security image of a man holding a symbol of a padlock inside a shield
Security

Your essential guide to internet security

We explain how to ensure both you and your business remain safe online
25 Jun 2021
Ransomware criminals look to other hackers to provide them with network access
Ransomware on a red screen
ransomware

Ransomware criminals look to other hackers to provide them with network access

New report finds ransomware gangs are buying access from hackers planting backdoors
17 Jun 2021
FBI still frowns on ransomware payments
FBI, DOJ badge on a crest
ransomware

FBI still frowns on ransomware payments

Even though major companies are paying millions in ransom, the FBI’s policy hasn’t changed
11 Jun 2021
Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw
Skull depicted in code
zero-day exploit

Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw

Chain of vulnerabilities used to attack multiple companies worldwide
9 Jun 2021
Cox Media Group suffers cyber attack
Cox Media logo on a black screen
cyber security

Cox Media Group suffers cyber attack

Live feeds on TV and radio stations go offline during incident
4 Jun 2021
New ransomware targets unpatched Microsoft Exchange servers
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

New ransomware targets unpatched Microsoft Exchange servers

Vulnerabilities in server software allow Epsilon Red to encrypt data
1 Jun 2021
Fake AnyDesk Google ads deliver malware
Malware under a magnifying glass
malware

Fake AnyDesk Google ads deliver malware

Malware pushed through Google search results
28 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Trojan virus within binary code
Security

Hackers use open source Microsoft dev platform to deliver trojans

Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
14 May 2021
Hackers used SonicWall zero-day flaw to plant ransomware
Ransomware on a red screen
ransomware

Hackers used SonicWall zero-day flaw to plant ransomware

Ransomware group UNC2447 used an SQL injection bug to attack US and European orgs
30 Apr 2021