Malware
Latest about Malware

FBI raids Chinese POS business following cyber attack claims
By Rene Millman published
News The business has been accused of selling terminals that acted as malware droppers and C2 servers

FontOnLake: "Sophisticated" malware targets Linux systems
By Rene Millman published
News The malware stands out for its ability to maintain persistence on the infected system

Akamai to acquire cyber security firm Guardicore
By Praharsha Anand published
News Guardicore’s micro-segmentation solution will add to Akamai’s Zero Trust Security portfolio

Malware developers create malformed code signatures to avoid detection
By Rene Millman published
News Google researchers uncovers technique used to push dodgy software onto unsuspecting victims

Hackers develop Linux port of Cobalt Strike for new attacks
By Rene Millman published
News The modified version of the penetration testing toolkit can evade malware detection

Widely-used WhatsApp mod stuffed with malware
By Keumars Afifi-Sabet published
News FMWhatsApp is embedded with the Triada Trojan which tracks device information and intercepts texts

Modified PRISM backdoor used in new attacks
By Rene Millman published
News Linux ELF executables used to avoid detection by antivirus products.

Windows 10 to start blocking potentially unwanted apps by default
By Sabina Weston published
News Previously, users who wanted to use the blocking feature had to turn it on in the App & browser control settings
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.