Malware
Latest about Malware

US authorities just purged malware from thousands of devices across the world
By Solomon Klappholz published
News After taking control of the PlugX malware’s command-and-control server, the coalition were able to trigger a self-delete mechanism to remove the malicious program

Open source malware surged by 156% in 2024
By Solomon Klappholz published
News Hackers are taking advantage of lax verification and surging demand to distribute and scale malware in record time

Two notorious infostealer malware operations were just knocked offline
By Solomon Klappholz published
News Infrastructure linked to two major infostealer malware strains has been seized in a joint law enforcement operation

New Loader Masquerades as Antivirus to Deliver SSLoad
By ITPro published
Sponsored by ANY.RUN
A new malware loader, PhantomLoader, disguises itself as an antivirus software module to deliver the evasive SSLoad malware, bypassing traditional security measures.

What is spyware?
By Keumars Afifi-Sabet last updated
In-depth Is spyware spying on you? What can you do about it?

Hackers are using a ChromeLoader exploit to set up fake companies and malware-ridden websites
By Bobby Hellard published
News Code-signing and malvertising are being used to guide victims to well-designed websites that offer seemingly legitimate tools like PDF readers and converters

Metrics that matter
By ITPro published
Whitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense

The cost of ‘good enough’ security
By ITPro published
Whitepaper Calculating the true value of cybersecurity solutions
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.