• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH

Search Results: malware

CrowdStrike Falcon Pro for Mac Achieves 100% Malware Protection, Wins Fifth AV-Comparatives Approved Mac Security Product Award

June 28, 2022 TechDecisions Staff Leave a Comment

Award validates CrowdStrike’s industry leadership in proactively protecting customers against today’s most advanced attacks AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced CrowdStrike Falcon Pro for Mac has won a fifth consecutive Approved Security Product award from leading independent testing organization AV-Comparatives, achieving the […]

Read More

Members Worldwide Gather at 55th General Meeting of the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) in London to Address Current and Emerging Issues in Messaging, Malware and Cybersecurity

May 27, 2022 TechDecisions Staff Leave a Comment

SAN FRANCISCO–(BUSINESS WIRE)–#cybersecurity–Members of the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) will gather June 13-16, 2022 in London as part of its global collaboration on messaging and online abuse. At its 55th general meeting, members and invited experts will address a number of topics related to its cybersecurity focus areas, including readiness, data […]

Read More

Ukrainian Consumers Targeted with 5X Increase in Digital Malware Attacks

May 10, 2022 TechDecisions Staff Leave a Comment

Client-side monitoring of commonplace websites and mobile apps verifies dramatic rise in malware exposure MCLEAN, Va.–(BUSINESS WIRE)–#Cybersecurity–The Media Trust, the preeminent leader in digital trust and safety for websites and mobile apps, confirms Ukrainian consumers are being targeted with malware. For at least 2 months prior to the physical military incursion, consumers experienced a 2X […]

Read More

Microsoft Defender Antimalware engine

Microsoft Unveils New Antimalware Engine Capabilities for Linux and macOS

Microsoft's new antimalware engine for Linux and macOS will help protect devices or endpoints within organizations.

April 27, 2022 TD Staff Leave a Comment

Microsoft announced an upgrade to its next generation of protection on Linux and MacOs with a new Microsoft Defender Antivirus malware engine. The new antimalware engine brings machine learning, big-data analysis, in-depth threat research, and the Microsoft cloud infrastructure to protect devices (or endpoints) within organizations. The new antimalware engine in Microsoft Defender is currently […]

Read More

Microsoft Defender Antimalware engine

How Tarrask Malware Uses Scheduled Tasks for Defense Evasion

Tarrask malware creates hidden scheduled tasks and subsequent actions to remove task attributes to conceal scheduled tasks.

April 15, 2022 TD Staff Leave a Comment

The Microsoft Detection and Response Team (DART) in collaboration with the Microsoft Threat Intelligence Center (MSTIC) is warning of a defense evasion malware called Tarrask. The malware creates “hidden” scheduled tasks, and subsequent actions to remove task attributes, to conceal scheduled tasks from traditional means of identification. Microsoft notes the simplicity of the malware technique, […]

Read More

Log4j, Most Exploited Vulnerabilities

Malware Developers Are Targeting These 10 2021 Security Bugs

Research from Skybox Security finds that security 2021 bugs in Log4j and Exchange Server are the most targeted by malware developers.

April 13, 2022 Zachary Comeau Leave a Comment

Security analysts at Skybox Security uncovered a 42% increase in new ransomware programs targeting known vulnerabilities last year, including critical vulnerabilities discovered in Log4j and Exchange Server. The San Jose, Calif. cybersecurity company’s 2022 Vulnerability and Trends Report, released this week, details how quickly hackers capitalize on new security bugs and continue to reduce the […]

Read More

Microsoft Defender Antimalware engine

The Qakbot Malware Now Interjects Itself Into The Middle of Email Conversations

Qakbot uses other compromised accounts to interject itself in the form of a reply-all email that includes a link to download malicious files.

March 11, 2022 Zachary Comeau Leave a Comment

The notorious and heavily distributed email-borne malware Qakbot is now being spread via a new technique: inserting malicious replies into the middle of existing email conversations. According to cybersecurity firm Sophos, Qakbot uses the compromised accounts of other infected victims to interject itself in the form of a reply-all message that includes a short sentence […]

Read More

Mobile Malware

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

New strains of mobile malware are recording audio and video, tracking location and destroying or wiping data, according to Proofpoint.

March 10, 2022 Zachary Comeau Leave a Comment

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report. This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware […]

Read More

Destructive Malware Ukraine

These Destructive Malware Strains Have Targeted Organizations in Ukraine

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine.

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Daxin Malware

Research Discover Highly Advanced Espionage Malware Linked To China-based Hackers

The Symantec Threat Hunter Team has discovered a highly sophisticated spying malware used by China-based threat actors.

February 28, 2022 Zachary Comeau Leave a Comment

Symantec, a subsidiary of Broadcom and a member of the U.S. Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative, has uncovered a new malware strain the company calls the most advanced piece of malware ever linked to China-based threat actors. The Symantec Threat Hunter team says it uncovered malware that appears to be used […]

Read More

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 47
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.