Malware
Discover expert analysis on malware with news, features and insights from the team at IT Pro.
-
Hackers are using a new AI chatbot to create malware
News Researchers at Abnormal Security have warned about the rise of GhostGPT, a new chatbot used by cyber criminals to create malicious code and malware.
By Nicole Kobie Published
News -
US authorities just purged malware from thousands of devices across the world
News After taking control of the PlugX malware’s command-and-control server, the coalition were able to trigger a self-delete mechanism to remove the malicious program
By Solomon Klappholz Published
News -
Open source malware surged by 156% in 2024
News Hackers are taking advantage of lax verification and surging demand to distribute and scale malware in record time
By Solomon Klappholz Published
News -
Two notorious infostealer malware operations were just knocked offline
News Infrastructure linked to two major infostealer malware strains has been seized in a joint law enforcement operation
By Solomon Klappholz Published
News -
New Loader Masquerades as Antivirus to Deliver SSLoad
Sponsored by ANY.RUN
A new malware loader, PhantomLoader, disguises itself as an antivirus software module to deliver the evasive SSLoad malware, bypassing traditional security measures.
By ITPro Published
-
What is spyware?
In-depth Is spyware spying on you? What can you do about it?
By Keumars Afifi-Sabet Last updated
In-depth -
Hackers are using a ChromeLoader exploit to set up fake companies and malware-ridden websites
News Code-signing and malvertising are being used to guide victims to well-designed websites that offer seemingly legitimate tools like PDF readers and converters
By Bobby Hellard Published
News -
Metrics that matter
Whitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense
By ITPro Published
Whitepaper -
The cost of ‘good enough’ security
Whitepaper Calculating the true value of cybersecurity solutions
By ITPro Published
Whitepaper -
Turning the tables
Whitepaper How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
By ITPro Published
Whitepaper -
Cloud in the crosshairs
Whitepaper How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365
By ITPro Published
Whitepaper -
Beyond awareness training
Whitepaper Building a sustainable security culture - and why it matters
By ITPro Published
Whitepaper