• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Malware

Atera ESET Integration

The Qakbot Malware Now Interjects Itself Into The Middle of Email Conversations

March 11, 2022 Zachary Comeau Leave a Comment

The notorious and heavily distributed email-borne malware Qakbot is now being spread via a new technique: inserting malicious replies into the middle of existing email conversations. According to cybersecurity firm Sophos, Qakbot uses the compromised accounts of other infected victims to interject itself in the form of a reply-all message that includes a short sentence […]

Read More

Mobile Malware

Mobile Malware That Can Spy On Users, Steal Credentials and Intercept Calls Is Up 500%

March 10, 2022 Zachary Comeau Leave a Comment

Enterprises that deploy smartphones and other mobile devices to its employees should be on the lookout for malware sent via text-based phishing, which has risen 500% since early February, cybersecurity firm Proofpoint says in a new report. This comes after a 2021 where malware attacks on mobile devices fell sharply. However, new strains of malware […]

Read More

Social Engineering

5 Strangest Social Engineering Tactics of 2021

March 3, 2022 TD Staff Leave a Comment

Cyber attackers can be quite inventive when it comes to social engineering and persuading someone to do something that isn’t always in their best interest— logging into a phishing site and entering their credentials, luring victims to pay a fake invoice, or simply opening a file containing malware. Cybersecurity firm Proofpoint rounded up the top […]

Read More

3CX Hack Supply Chain attack compromise

These Destructive Malware Strains Have Targeted Organizations in Ukraine

March 2, 2022 Zachary Comeau Leave a Comment

There are now three different strains of destructive malware that have been identified in cyberattacks against organizations in Ukraine, and IT security professionals should be aware of both, especially as cybersecurity experts expect a broader range of cyberattacks to target Western organizations as the U.S. and allies respond to the crisis. Both strains of malware, […]

Read More

Malware file types, HP Wolf security

Research Discover Highly Advanced Espionage Malware Linked To China-based Hackers

February 28, 2022 Zachary Comeau Leave a Comment

Symantec, a subsidiary of Broadcom and a member of the U.S. Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative, has uncovered a new malware strain the company calls the most advanced piece of malware ever linked to China-based threat actors. The Symantec Threat Hunter team says it uncovered malware that appears to be used […]

Read More

Russia Cyberattack

10 Things IT Can Do To Harden Cyber Defenses Amid The Russia-Ukraine Conflict

February 25, 2022 Zachary Comeau Leave a Comment

Cyberattacks have been front and center in the Ukraine crisis, as the country is not just suffering from conventional warfare as it fights with Russia. The country’s critical infrastructure has been repeatedly attacked, purportedly by hackers working for their next door adversary. These attacks have targeted government websites, infrastructure and more with DDoS attacks and […]

Read More

Malware Symantec Daxin

Sansec Finds Mass Breach Of Stores Running On Magento 1 E-Commerce Platform

February 11, 2022 TD Staff Leave a Comment

Adobe is urging organizations who use the Magento 1 e-commerce platform to upgrade to the latest Adobe Commerce platform. Sansec, an e-commerce malware and detection tool has identified a mass breach of over 500 stores running on the Magento 1 ecommerce platform. Although Adobe ended support for Magento 1 in June of 2020, many companies […]

Read More

Cloud Security, manageengine SIEM Log360 Cloud

Cybercriminals Are Using Malware To Target Linux-Based Systems

February 9, 2022 TD Staff Leave a Comment

With 90% of multi-cloud environments running on Linux-based systems and current malware countermeasures mostly focused on addressing Windows-based threats, attackers have found a golden opportunity to strike as cybercriminals are increasingly targeting Linux-based operating systems, according to latest research from VMware. The company’s new report, “Exposing Malware in Linux-based Multi-Cloud Environments,” shows ransomware is evolving […]

Read More

3CX Supply Chain Attack

Microsoft Temporarily Disables Exploited MSIX Protocol Handler

February 7, 2022 Zachary Comeau Leave a Comment

Microsoft says that it has disabled the MSIX ms-appinstaller protocol and is working on a fix after a security bug was discovered that allows an attacker to spoof App Installer. According to a Microsoft Tech Community blog, an attacker could spoof App Installer to install a package that a user did not intend to install. […]

Read More

Malware Symantec Daxin

Report: 2021 Malware, Ransomware Levels Already Surpassed 2020 Levels By End Of Q3

January 20, 2022 Zachary Comeau Leave a Comment

While new research shows a decrease in total perimeter malware detection volume in the third quarter from the record highs in the second quarter, there was still more malware activity through the first three quarters than all of 2020. The report from endpoint protection provider WatchGuard Technologies also found that nearly half of zero-day malware […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.