Malware developers create malformed code signatures to avoid detection
Malware in code
malware

Malware developers create malformed code signatures to avoid detection

Google researchers find techniques used to push dodgy software onto unsuspecting victims.
24 Sep 2021
HP Wolf Security: Threat insights report
Skyscrapers from belowwhitepaper
Whitepaper

HP Wolf Security: Threat insights report

Equipping security teams with the knowledge to combat emerging threats
24 Sep 2021
What's the difference between antimalware and antivirus?
Click here for malware
malware

What's the difference between antimalware and antivirus?

We help you navigate the worlds of antimalware and antivirus
17 Sep 2021
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
15 Sep 2021
Hackers develop Linux port of Cobalt Strike for new attacks
Malware represented by red and blue digital binary code
Security

Hackers develop Linux port of Cobalt Strike for new attacks

The modified version of the penetration testing toolkit can evade malware detection
14 Sep 2021
Ragnar Locker vows to leak data if victim contacts the police
Visual representation of ransomware by showing encrypted files on a display
ransomware

Ragnar Locker vows to leak data if victim contacts the police

The ransomware gang said victims hiring "professional negotiators" are making the recovery process worse
7 Sep 2021
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective methods for stealing passwords
7 Sep 2021
Hackers use WebSVN to deploy new Mirai malware
Malware in code
malware

Hackers use WebSVN to deploy new Mirai malware

Attackers used the notorious malware to perform distributed denial of service attacks
31 Aug 2021
Fin8 returns with Badhatch backdoor targeting US organizations
Malware in code
malware

Fin8 returns with Badhatch backdoor targeting US organizations

The backdoor evades security with TLS encrypted PowerShell commands
30 Aug 2021
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
27 Aug 2021
Widely-used WhatsApp mod stuffed with malware
Malware spotted in red code on black background
malware

Widely-used WhatsApp mod stuffed with malware

FMWhatsApp is embedded with the Triada Trojan which tracks device information and intercepts texts
25 Aug 2021
Bahrain targets activists with NSO's Pegasus spyware
Computer code on a screen with a skull representing a computer virus / malware attack.
spyware

Bahrain targets activists with NSO's Pegasus spyware

The spyware reportedly employed two exploits targeting Apple's iMessage system
24 Aug 2021
Modified PRISM backdoor used in new attacks
A person on a laptop to depict hacking
malware

Modified PRISM backdoor used in new attacks

Linux ELF executables used to avoid detection by antivirus products.
23 Aug 2021
Criminals caught trying to recruit insiders to plant ransomware
Ransomware on a red screen
ransomware

Criminals caught trying to recruit insiders to plant ransomware

Employees offered cut of proceeds if they deploy DemonWare on their behalf
20 Aug 2021
Delivery scams become most common form of smishing
A person wearing an orange T-shirt is delivering parcels to a satisfied client
scams

Delivery scams become most common form of smishing

Cyber security provider Proofpoint finds a major increase in the number of threat actors impersonating postal services
17 Aug 2021
Windows 10 to start blocking potentially unwanted apps by default
Screenshot of the potentially unwanted apps default blocking feature
Microsoft Windows

Windows 10 to start blocking potentially unwanted apps by default

Previously, users who wanted to use the blocking feature had to turn it on in the App & browser control settings
3 Aug 2021
Microsoft warns of dangerous ‘BazaCall’ call centre ransomware scam
A fraudulent call centre agent in a dark room surrounded by monitors
ransomware

Microsoft warns of dangerous ‘BazaCall’ call centre ransomware scam

Human operators are tricking victims into manually downloading malware onto their systems
30 Jul 2021
Hackers turning to 'exotic' languages for next-gen malware, report warns
A person on a laptop to depict hacking
malware

Hackers turning to 'exotic' languages for next-gen malware, report warns

Coding languages such as Go, Rust, Nim and DLang are allowing malware authors to avoid signature detection and add layers of obfuscation
27 Jul 2021
What is Maze Ransomware?
Ransomware message on a computer screen
ransomware

What is Maze Ransomware?

This Windows ransomware has targeted many organizations worldwide
22 Jul 2021
CISA warns of disguised malware on hacked Pulse Secure devices
Red skull and crossbones atop binary code
malware

CISA warns of disguised malware on hacked Pulse Secure devices

CISA lists several tasks administrators can complete to boost security
22 Jul 2021
New malware uses search engine ads to target pirate gamers
Skull and crossbones on a computerized background
malware

New malware uses search engine ads to target pirate gamers

MosaicLoader uses advanced obfuscation techniques to avoid detection
21 Jul 2021
Hackers abuse single bit change in Intel CPU register to evade detection
Macro view of modern multicore CPU processor in human hand with PC computer motherboard in background
malware

Hackers abuse single bit change in Intel CPU register to evade detection

Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed
20 Jul 2021
Best free malware removal tools 2021
Malware spotted in red code on black background
Security

Best free malware removal tools 2021

Worried your device is infected? Here are the tools you need to get rid of malicious software
16 Jul 2021