• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

Website Contact Form Malware

Microsoft Warns of New Browser-Modifying Malware

Microsoft is warning about new malware that infects a device and adds browser extensions and changes settings to insert unauthorized ads into web pages.

December 11, 2020 Zachary Comeau Leave a Comment

Microsoft is warning about a new malware strain that infects a user’s device and adds browser extensions and changes settings to insert unauthorized ads into web pages. In a blog post, the Microsoft 365 Defender Research Team calls this family of browser-modification malware Adrozek. The malware has been infecting devices since at least May, and […]

Read More

Atera ESET Integration

Kentucky University & UK Healthcare End Month-Long Malware Attack

Hackers from outside the United States compromised University of Kentucky computer networks to mine cryptocurrency in large malware attack.

March 20, 2020 TechDecisions Staff Leave a Comment

The largest university system in Kentucky recently rebooted its networks after dealing with a large-scale malware attack for a month. Officials say it was the worst in the school’s history. According to officials, the three-hour campus-wide network outage at the University of Kentucky (UK) and UK Healthcare was successful at “mitigating the existing cyber threat,” […]

Read More

Malware Google Authenticator

A New Malware Strain Can Steal Google Authenticator Codes, Report Says

Cybersecurity researchers have discovered a new version of an Android malware that can extract and steal one-time passcodes.

March 9, 2020 Zachary Comeau Leave a Comment

Cybersecurity researchers have discovered a new version of an Android malware that can extract and steal one-time passcodes generated through a Google two-factor authentication tool. According to ZDNet, the malware, called Cerberus, can intercept passcodes generated through Google Authenticator, a mobile app that’s used as two-factor authentication layer that works by generating six-to-eight-digit codes that […]

Read More

Threat Runner from HORNE Cyber Allows Testing of Network Response to Malware

HORNE Cyber has launched Threat Runner, a software that allows organizations of any size to safely test how their networks will respond to real malware like Wannacry, Satan and Cerber.

July 5, 2019 TechDecisions Staff Leave a Comment

HORNE Cyber has launched Threat Runner, a software that allows organizations of any size to safely test how their networks will respond to real malware like Wannacry, Satan and Cerber.

Read More

Proofpoint CISO, CISOs cyberattack

The Dark Side of Deep Learning – When Malware Attacks

Today’s cyberattacks in deep learning comes in two major forms: targeting and obfuscation.

December 11, 2018 TechDecisions Staff Leave a Comment

Today’s cyberattacks in deep learning comes in two major forms: targeting and obfuscation.

Read More

cyber-attack-skull

Spike in Cyberattacks Exposes Vulnerabilities in University Security Measures

No matter an institution’s budgetary limitations, there are proven measures that institutions can adopt to enhance campus security and safeguard their resources.

August 21, 2023 Kevin Kirkwood Leave a Comment

Note: The views expressed by guest bloggers and contributors are those of the authors and do not necessarily represent the views of, and should not be attributed to My TechDecisions. As expected from authorities anticipating an increase in threats to the education sector, cyberattacks are continuing to wreak havoc on colleges and universities across the United States. As […]

Read More

Barracuda ESG

Barracuda: Replace Compromised ESG Appliances Immediately

Barracuda Networks is urging organizations with Email Security Gateway appliances impacted by a remote command injection bug to replace them.

June 12, 2023 Zachary Comeau Leave a Comment

[Editor’s Note: This article has been updated to reflect Barracuda Networks’ official statement.] Barracuda Networks is urging organizations with Email Security Gateway appliances impacted by a remote command injection bug in the devices to replace them, even if they were patched. The company’s recommendation comes after Barracuda was first alerted to anomalous traffic coming from […]

Read More

Phishing, Email security

Email Attacks are Evading Security Protections. Here’s How Security Teams Should Respond.

IT, security teams and end users should take these actions to combat increasingly sophisticated email threats.

June 6, 2023 Trevor Collins Leave a Comment

Instances of business email compromise (BEC) – a targeted form of phishing in which attackers try to scam companies out of money or goods or trick employees into giving up sensitive info – have continued to increase, causing devastating impacts. Last year, the FBI’s Internet Crime Complaint Center (IC3) reported $43 billion of global exposed […]

Read More

NSA Programming Languages

The Cyberattacks and Insider Threats During The Development of China’s C919 Passenger Jet

As China celebrates the first commercial flight of its C919 jet, we look back at allegations of hacking and insider threats during its development.

June 5, 2023 Zachary Comeau Leave a Comment

Over the weekend, China claimed a major win by launching the first commercial flight of the C919, the country’s first domestically manufactured large passenger jet built by the Commercial Aviation Corporation of China (COMAC). However, some non-China-based aviation manufacturers and cybersecurity firms may opt to use the term “domestically manufactured” loosely. According to CNN, the […]

Read More

iPhone security bug, Apple, Kaspersky

Kaspersky Discovers New 0-Click iOS Exploit

Russia-based cybersecurity firm Kaspersky warns of new 0-click exploit targeting Apple iOS devices as Russia accuses NSA.

June 1, 2023 Zachary Comeau Leave a Comment

Cybersecurity firm Kaspersky says it is investigating “previously unknown” malware targeting the company’s own employee’s Apple iOS devices that can compromise devices via the iMessage service with an attachment without any user interaction. According to Kaspersky, the message triggers a vulnerability that leads to code execution, and the code within the exploit downloads several subsequent […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Page 6
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.