Ikea launches "full-scale investigation" into email-based cyber attack
IKEA sign on a wall with cloudy sky in background
cyber attacks

Ikea launches "full-scale investigation" into email-based cyber attack

Early evidence seems to indicate a compromise of Microsoft Exchange servers in a reply chain attack campaign
29 Nov 2021
CronRat Magecart malware uses 31st February date to remain undetected
Cronrat strikes Linux
malware

CronRat Magecart malware uses 31st February date to remain undetected

The malware allows for server-side payment skimming that bypasses browser security
26 Nov 2021
Hackers use SquirrelWaffle malware to hack Exchange servers in new campaign
Microsoft Exchange logo displayed on a laptop
malware

Hackers use SquirrelWaffle malware to hack Exchange servers in new campaign

Researchers discovered malicious emails being sent as replies to existing email chains
22 Nov 2021
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
Small shopping cart on a keyboard
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

Cyber criminals in China control the malware
19 Nov 2021
Best free malware removal tools 2021
Malware spotted in red code on black background
Security

Best free malware removal tools 2021

Worried your device is infected? Here are the tools you need to get rid of malicious software
19 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
"Ransomware" text within binary code
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

Seven in ten security pros called in to handle attacks were intoxicated, report finds
18 Nov 2021
Emotet infrastructure has almost doubled since resurgence was confirmed
3D illustration of the emotet botnet triggering an alert on a smartphone positioned next to a laptop
malware

Emotet infrastructure has almost doubled since resurgence was confirmed

Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation
17 Nov 2021
BazarLoader malware abuses Windows 10 apps in 'Call Me Back' attack
The Windows (start menu) key on a keyboard
phishing

BazarLoader malware abuses Windows 10 apps in 'Call Me Back' attack

The highly targeted phishing campaign abuses appxbundle to infect devices
12 Nov 2021
Millions of routers and NAS devices vulnerable to BotenaGo malware
Malware in code
malware

Millions of routers and NAS devices vulnerable to BotenaGo malware

The malware takes advantage of 33 different exploits to attack routers and IoT devices
12 Nov 2021
Europol reveals how ransomware gangs are evolving to evade capture
Image of a Europol sign affixed to its Amsterdam headquarters
cyber crime

Europol reveals how ransomware gangs are evolving to evade capture

The annual crime report explains how ransomware continues to grow in profitability despite recent capture attempts, and the novel ways DDoS attackers …
12 Nov 2021
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
9 Nov 2021
What is Maze ransomware?
Ransomware message on a computer screen
ransomware

What is Maze ransomware?

This Windows ransomware has targeted many organisations worldwide
9 Nov 2021
Mekotio trojan continues to spread despite its operators’ arrests
Red horse image imposed atop a circuitboard
trojans

Mekotio trojan continues to spread despite its operators’ arrests

Hackers have used it in 100 more attacks since arrests
4 Nov 2021
Microsoft Exchange Servers are being used to distribute Qakbot malware
A laptop on a table with the Microsoft Exchange logo displayed
ransomware

Microsoft Exchange Servers are being used to distribute Qakbot malware

Exploiting an unpatched Exchange Server vulnerability and a less-than-foolproof malicious URL strategy is leading to mounting infections in businesses
2 Nov 2021
Hackers could use new Wslink malware in highly targeted cyber attacks
Malware in code
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

Malware acts as a server, but its origins baffle boffins
1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
A PAX point of sale terminal in a store
malware

FBI raids Chinese POS business following cyber attack claims

The business has been accused of selling terminals that acted as malware droppers and C2 servers
27 Oct 2021
Malware discovered in JavaScript Library accessed by millions each week
Malware mockup image
cyber security

Malware discovered in JavaScript Library accessed by millions each week

Password-stealing trojans and cryptocurrency miners were installed on a library used by the likes of Facebook, Microsoft, and Amazon
25 Oct 2021
Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
ransomware

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
14 Oct 2021
FontOnLake: "Sophisticated" malware targets Linux systems
Malware in code
malware

FontOnLake: "Sophisticated" malware targets Linux systems

The malware stands out for its ability to maintain persistence on the infected system
11 Oct 2021
What is NotPetya?
Graphic showing the NotPetya logo on a laptop
ransomware

What is NotPetya?

We take a look at the malware that first came to prominence in 2016 and targets Windows-based machines
8 Oct 2021
Maverick fast-attack ransomware group FIN12 is quickly expanding
Ransomware message on a computer screen
ransomware

Maverick fast-attack ransomware group FIN12 is quickly expanding

FIN12 hits hospitals even during pandemic
7 Oct 2021
Senator to introduce new bill to force ransomware payment disclosures
The senate floor during a vote
ransomware

Senator to introduce new bill to force ransomware payment disclosures

Organizations would have 48 hours to inform DHS
6 Oct 2021
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
1 Oct 2021