• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Malware

iPhone security bug, Apple, Kaspersky

Kaspersky Discovers New 0-Click iOS Exploit

June 1, 2023 Zachary Comeau Leave a Comment

Cybersecurity firm Kaspersky says it is investigating “previously unknown” malware targeting the company’s own employee’s Apple iOS devices that can compromise devices via the iMessage service with an attachment without any user interaction. According to Kaspersky, the message triggers a vulnerability that leads to code execution, and the code within the exploit downloads several subsequent […]

Read More

SASE, SASE approaches, SASE implementation

Proofpoint Unveils New Innovations to Combat Increasingly Common Threats

April 24, 2023 TD Staff Leave a Comment

Ahead of the 2023 RSA Conference, Proofpoint, Inc., the Sunnyvale, Calif.-based cybersecurity and compliance company, unveiled a host of innovations across its Aegis Threat Protection, Identity Threat Defense and Sigma Information Protection platforms. The company’s latest solutions empower organizations to stop malicious email attacks, detect and prevent identity-based threats and defend sensitive data from theft, loss and insider […]

Read More

Atera ESET Integration

Atera, ESET Launch Anti-Malware, Threat Detection Integration

March 10, 2023 Zachary Comeau Leave a Comment

Cloud-based remote IT management software company Atera is launching a new integration with cybersecurity firm ESET to allow Atera users to deploy anti-malware solutions. The partnership pairs ESET’s advanced security solutions with Atera’s cloud-based platform to help IT professionals automate and protect vital assets within the Atera platform. The integration results in an anti-malware and […]

Read More

These 3 Departments Pose the Highest Risk of Being Hacked

February 18, 2023 TD Staff Leave a Comment

Cybersecurity experts from NordLocker, part of Nord Security, reveal that employees from certain departments are much more lucrative targets for cybercriminals than others. With human error being the reason behind a whopping 82% of data breaches, employees are the weakest link when it comes to organizational cybersecurity. “From receptionists to the C-Suite, every employee should […]

Read More

Atera ESET Integration

Hackers Are Pivoting to OneNote Documents for Malware Delivery

February 6, 2023 Zachary Comeau Leave a Comment

Threat actors are increasingly using OneNote documents to deliver malware as Microsoft makes it difficult for them to use other Office documents by blocking macros by default. Now, hackers are experimenting with other file types, including using virtual hard disk, compiled HTML and OneNote, according to new research from enterprise security software company Proofpoint. The […]

Read More

Atera ESET Integration

Malware-Delivering Cloud Apps Nearly Tripled in 2022

January 11, 2023 Alyssa Borelli Leave a Comment

Over 400 distinct cloud applications delivered malware in 2022, nearly tripling the amount seen in the prior year, according to the latest research from Netskope, the Santa Clara, Calif.-based SASE provider. Netskope researchers also found that 30% of all cloud malware downloads in 2022 originated from Microsoft OneDrive. As cloud apps are widely used by […]

Read More

FBI search engine ads, tablet, Gartner, worldwide device shipments

FBI: Beware of Search Engine Ads

December 21, 2022 Zachary Comeau Leave a Comment

The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]

Read More

Malware file types, HP Wolf security

HP: Archive File Format Use Among Hackers on the Rise

December 5, 2022 Zachary Comeau Leave a Comment

Office files are no longer the most common file type for delivering malware, as archive file formats such as ZIP and RAR files are the file type of choice for threat actors to deliver malware, according to a new report from HP Wolf Security. The findings come from a quarterly report from HP’s endpoint security […]

Read More

3CX Hack Supply Chain attack compromise

These are the Top 11 Malware Strains Observed in 2021

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

Atera ESET Integration

Microsoft Office Flaws Exploited in Nearly 80% of Malware Attacks

July 20, 2022 TD Staff Leave a Comment

Microsoft Office remains the most widely exploited software for malware delivery, according data by Atlas VPN. The primary reason is that a significant portion of Office users delay essential security updates, keeping the door open for fraudsters to inject malicious code through various loopholes, even if they are already known publicly. In Q1 2022, as […]

Read More

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.