• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: malware

Google Cybersecurity Certificate

10 Common Cybersecurity Mistakes Your Organization is Making

The 10 most common ways attackers gain initial access are not all that hard to secure, according to new CISA advisory.

May 23, 2022 Zachary Comeau Leave a Comment

With more of the world relying on technology to connect and maintain business continuity over the last two years, malicious cyber actors have stepped up their game to exploit weaknesses in organizations’ IT infrastructure and conduct a broad range of attacks against both public and private entities. However, network defenders and IT professionals can stop […]

Read More

3CX Supply Chain Attack

Watch Out For This Linux DDoS Trojan, Microsoft Says

Microsoft says it has observed a 254% increase in activity from XorDdos, an eight-year-old Linux trojan targeting Linux-based systems.

May 23, 2022 Zachary Comeau Leave a Comment

Microsoft says it has observed a 254% increase in activity over the last six months from an eight-year-old Linux trojan targeting Linux-based operating systems on cloud infrastructures and IoT devices. The malware, called XorDdos, is named after its attack method, denial of service on Linux endpoints and servers, in addition to XOR-based encryption for its […]

Read More

Cryptojacking, Sysrv

Microsoft: Watch Out For This New Sysrv Botnet Varient

Microsoft is urging organizations to secure their systems after discovering a new Sysrv botnet variant that leverages security bugs.

May 17, 2022 Zachary Comeau Leave a Comment

Microsoft is urging organizations to secure internet-facing systems, apply security updates and secure credentials after discovering a new variant of the Sysrv botnet, which is known for exploiting vulnerabilities in web apps and databases to install coin miners on Windows and Linux systems. In a series of tweets, the Redmond, Wash. IT giant says the […]

Read More

Google, Bard

Google I/O: New Security Features in Workspace, Enrolling More Users In MFA

New phishing and malware protections in Workspace and the automatic enrollment of users in MFA highlight Google's security announcements during I/O.

May 13, 2022 Zachary Comeau Leave a Comment

In addition to a range of new developer tools and new features in Workspace and Google Meet, Google announced during its I/O conference this week several new security features to help keep users and organizations secure. The new security capabilities include account safety for apps, new phishing protections, virtual cards and automatic enrollment in multi-factor […]

Read More

OT Cybersecurity, network security

8 Easy Ways to Fortify Operations from Cyber Threats with Technology You Already Have

Companies can take advantage of security features and best practices from existing investments with no further spend required.

May 13, 2022 Matt Powers Leave a Comment

If you thought cybersecurity couldn’t become more of a priority, think again. Belligerent nation-states and other bad actors are expected to launch a concerted effort to steal trade secrets, disrupt services, and execute malicious programs intended to cause infrastructure outages, damages, and worse. One study found a 100% increase in nation-state incidents from 2017 to […]

Read More

Microsoft Fortra healthcare ransomware

Do You Trust Your Disaster Recovery Solution?

Research from disaster recovery provider Zerto finds that organizations are struggling with disaster recovery in the face of cyberattacks.

May 12, 2022 Zachary Comeau Leave a Comment

Nearly 80% of medium and large organizations across North America and Western Europe have had to trigger a disaster recovery response within the last 12 months due to cyberattacks and other disasters, according to new research from Boston-based disaster recovery software provider Zerto. The research, “The state of Ransomware and Disaster Preparedness: 2022,” suggests that […]

Read More

Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies

May 5, 2022 TechDecisions Staff Leave a Comment

The company will continue the development of Comae’s memory analysis platform and seek to incorporate its capabilities into existing solutions WATERLOO, Ontario–(BUSINESS WIRE)–Magnet Forensics (TSX: MAGT), a developer of digital investigation solutions for more than 4,000 enterprises and public safety organizations in over 100 countries, today announced the acquisition of the strategic IP assets of […]

Read More

IoT Security

This Hacking Group Uses Unsecure IP Camera Systems to Hide From IT

Mandiant says it is tracking a new threat actor that leverages unsecure videoconferencing cameras to hide in victim environments.

May 3, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Mandiant has published a detailed analysis of a new threat actor that has been observed remaining undetected in victim environments for at 18 months by installing backdoors on IP cameras appliances that do not support security tools and leveraging a large IoT botnet to spy on organizations involved in large corporate transactions. According […]

Read More

Microsoft Security RSA Conference

Microsoft Defender For Business Is Now Generally Available

Microsoft Defender for Business brings enterprise-grade endpoint security, detection and response to smaller organizations.

May 2, 2022 Zachary Comeau Leave a Comment

Microsoft is launching the general availability of the stand-alone version of Microsoft Defender for Business, a new offering designed for small-to-mid-sized businesses that brings enterprise-grade endpoint security, detection and response to smaller organizations. According to Microsoft, this is designed to provide protection against ransomware and other sophisticated cyberattacks for SMBs, who say cyberthreats are becoming […]

Read More

Google Cybersecurity Certificate

Red Canary Announces Linux-First EDR, MDR Solution

Red Canary is launching a new endpoint detection and response solution built specifically to secure Linux environments.

April 29, 2022 Zachary Comeau Leave a Comment

Cybersecurity firm Red Canary is launching a new endpoint detection and response solution for Linux, designed to focus on the constraints that DevOps, engineering and security teams demand. According to the company, the Linux EDR and MDR solution will help organizations better protect their Linux environments, which can be difficult to secure. The solution leverages […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Interim pages omitted …
  • Page 47
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2026 Emerald X, LLC. All rights reserved.