malware

What is Maze Ransomware?
Ransomware message on a computer screen
ransomware

What is Maze Ransomware?

This Windows ransomware has targeted many organizations worldwide
22 Jul 2021
CISA warns of disguised malware on hacked Pulse Secure devices
Red skull and crossbones atop binary code
malware

CISA warns of disguised malware on hacked Pulse Secure devices

CISA lists several tasks administrators can complete to boost security
22 Jul 2021
The five essentials from your endpoint security partner
Five essentials from your endpoint security partner - title against a background of blue circles - whitepaper from Malwarebyteswhitepaper
Whitepaper

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently
22 Jul 2021
New malware uses search engine ads to target pirate gamers
Skull and crossbones on a computerized background
malware

New malware uses search engine ads to target pirate gamers

MosaicLoader uses advanced obfuscation techniques to avoid detection
21 Jul 2021
Hackers abuse single bit change in Intel CPU register to evade detection
Macro view of modern multicore CPU processor in human hand with PC computer motherboard in background
malware

Hackers abuse single bit change in Intel CPU register to evade detection

Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed
20 Jul 2021
2021 state of email security report: Ransomware on the rise
2021 state of email security report: Ransomware on the rise - whitepaper from Mimecastwhitepaper
Whitepaper

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world
15 Jul 2021
84% of organizations experienced phishing or ransomware attacks in the last year
Padlock being lifted by a fishing hook on a blue background to symbolise phishing attacks
ransomware

84% of organizations experienced phishing or ransomware attacks in the last year

New research finds half of US firms are not effective in countering cyber threats
12 Jul 2021
Maryland water company investigating ransomware attack
Overhead photograph of a water treatment plant
ransomware

Maryland water company investigating ransomware attack

The attack on WSSC Water affected non-essential business systems
28 Jun 2021
Your essential guide to internet security
Abstract cyber security image of a man holding a symbol of a padlock inside a shield
Security

Your essential guide to internet security

We explain how to ensure both you and your business remain safe online
25 Jun 2021
Ransomware criminals look to other hackers to provide them with network access
Ransomware on a red screen
ransomware

Ransomware criminals look to other hackers to provide them with network access

New report finds ransomware gangs are buying access from hackers planting backdoors
17 Jun 2021
FBI still frowns on ransomware payments
FBI, DOJ badge on a crest
ransomware

FBI still frowns on ransomware payments

Even though major companies are paying millions in ransom, the FBI’s policy hasn’t changed
11 Jun 2021
Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw
Skull depicted in code
zero-day exploit

Windows devices targeted by PuzzleMaker malware exploiting Chrome zero-day flaw

Chain of vulnerabilities used to attack multiple companies worldwide
9 Jun 2021
Cox Media Group suffers cyber attack
Cox Media logo on a black screen
cyber security

Cox Media Group suffers cyber attack

Live feeds on TV and radio stations go offline during incident
4 Jun 2021
New ransomware targets unpatched Microsoft Exchange servers
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

New ransomware targets unpatched Microsoft Exchange servers

Vulnerabilities in server software allow Epsilon Red to encrypt data
1 Jun 2021
Fake AnyDesk Google ads deliver malware
Malware under a magnifying glass
malware

Fake AnyDesk Google ads deliver malware

Malware pushed through Google search results
28 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Trojan virus within binary code
Security

Hackers use open source Microsoft dev platform to deliver trojans

Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
14 May 2021
Hackers used SonicWall zero-day flaw to plant ransomware
Ransomware on a red screen
ransomware

Hackers used SonicWall zero-day flaw to plant ransomware

Ransomware group UNC2447 used an SQL injection bug to attack US and European orgs
30 Apr 2021
Botnet targets vulnerable Microsoft Exchange servers
Botnet on a red background
botnets

Botnet targets vulnerable Microsoft Exchange servers

Cryptocurrency-mining botnet Prometei targeting same flaws as Hafnium attacks
23 Apr 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
A collection of various coins with cryptocurrency logos embedded onto them
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

Hackers stealing from wannabe hackers using fake software
16 Apr 2021
Weakness in Mamba ransomware could help recover data
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

Weakness in Mamba ransomware could help recover data

A two-hour gap before system restart could save organizations from paying the ransom
26 Mar 2021
Invoice ZLoader campaign hides within encrypted Excel docs
Malware in code
malware

Invoice ZLoader campaign hides within encrypted Excel docs

Emails use fake new IRS taxation rules to lure victims
8 Mar 2021
MacBook users warned against EvilQuest ransomware
Red skull and crossbones atop binary code
ransomware

MacBook users warned against EvilQuest ransomware

The malware aims to encrypt macOS devices, which are typically less affected by ransomware
19 Feb 2021
Agent Tesla malware evades security controls to infect systems
Malware in code
malware

Agent Tesla malware evades security controls to infect systems

The weakest link in malware prevention is still the average user
3 Feb 2021