• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH

Malware

Ransomware Microsoft NordLocker cyberattack, departments most at risk of being hacked

These 3 Departments Pose the Highest Risk of Being Hacked

January 18, 2023 TD Staff Leave a Comment

Cybersecurity experts from NordLocker, part of Nord Security, reveal that employees from certain departments are much more lucrative targets for cybercriminals than others. With human error being the reason behind a whopping 82% of data breaches, employees are the weakest link when it comes to organizational cybersecurity. “From receptionists to the C-Suite, every employee should […]

Read More

Microsoft Defender Antimalware engine, cloud delivered malware

Malware-Delivering Cloud Apps Nearly Tripled in 2022

January 11, 2023 Alyssa Borelli Leave a Comment

Over 400 distinct cloud applications delivered malware in 2022, nearly tripling the amount seen in the prior year, according to the latest research from Netskope, the Santa Clara, Calif.-based SASE provider. Netskope researchers also found that 30% of all cloud malware downloads in 2022 originated from Microsoft OneDrive. As cloud apps are widely used by […]

Read More

FBI search engine ads

FBI: Beware of Search Engine Ads

December 21, 2022 Zachary Comeau Leave a Comment

The FBI is urging organizations and their end users to be careful when using search engines as cybercriminals are using search engine advertisement services to impersonate brands and direct users to fake websites designed to steal credentials and deploy ransomware. According to a public service announcement from the FBI, cybercriminals have been buying advertisements that […]

Read More

Malware file types, HP Wolf security

HP: Archive File Format Use Among Hackers on the Rise

December 5, 2022 Zachary Comeau Leave a Comment

Office files are no longer the most common file type for delivering malware, as archive file formats such as ZIP and RAR files are the file type of choice for threat actors to deliver malware, according to a new report from HP Wolf Security. The findings come from a quarterly report from HP’s endpoint security […]

Read More

CISA Top Malware Strains

These are the Top 11 Malware Strains Observed in 2021

August 5, 2022 Zachary Comeau Leave a Comment

A new joint cybersecurity advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) details the 11 most-observed malware strains from the last year, including remote access Trojans, banking Trojans, information stealers and ransomware. In the advisory, CISA along with the ACSC says most of these top malware […]

Read More

Microsoft Defender Antimalware engine, cloud delivered malware

Microsoft Office Flaws Exploited in Nearly 80% of Malware Attacks

July 20, 2022 TD Staff Leave a Comment

Microsoft Office remains the most widely exploited software for malware delivery, according data by Atlas VPN. The primary reason is that a significant portion of Office users delay essential security updates, keeping the door open for fraudsters to inject malicious code through various loopholes, even if they are already known publicly. In Q1 2022, as […]

Read More

Atera Malwarebytes

Atera Launches New Malwarebytes Integration

July 8, 2022 Zachary Comeau Leave a Comment

Remote monitoring and IT management provider Atera now offers a new integration with anti-malware provider Malwarebytes to automate licensing and provisioning of the company’s OneView platform to help streamline and maximize security operations. The integration will effectively allow users to deploy Malwarebytes products directly through Atera’s remote monitoring and management platform, giving customers access to […]

Read More

XorDdos, Linux DDoS Trojan

Watch Out For This Linux DDoS Trojan, Microsoft Says

May 23, 2022 Zachary Comeau Leave a Comment

Microsoft says it has observed a 254% increase in activity over the last six months from an eight-year-old Linux trojan targeting Linux-based operating systems on cloud infrastructures and IoT devices. The malware, called XorDdos, is named after its attack method, denial of service on Linux endpoints and servers, in addition to XOR-based encryption for its […]

Read More

Threat Detection Trends

12 Threat Detection Trends IT Pros Should Know

April 29, 2022 TD Staff Leave a Comment

Red Canary, the Denver-based managed detection and response (MDR) provider performed an analysis of emerging and significant trends that its cybersecurity team encountered over the past year. Its annual 2022 Threat Detection Report covers the most prominent trends of 2021 and shows major themes that may prelude into 2022. Last year,  ransomware groups (Sodinokibi/REvil, BlackMatter, […]

Read More

XorDdos, Linux DDoS Trojan

Emotet Pivots From Office Macros to OneDrive URLs and PowerShell, Security Researchers Warn

April 27, 2022 Zachary Comeau Leave a Comment

Notorious botnet Emotet is reportedly testing out new attack methods that bypass new Microsoft protections against Macros in Office documents and leverage OneDrive URLs and PowerShell. The Emotet botnet began its reemergence in November 2021 after its January 2021 takedown by a multinational coalition of law enforcement, with the group associated with the botnet targeting […]

Read More

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.