malware detection
![hidden attacker](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103527/fish-hidden-400x200.jpg)
Attackers’ growing use of anti-analysis, evasion tactics pose a challenge to enterprises
Cybercriminals continue to look for new attack opportunities throughout the digital attack surface and are leveraging evasion as well as anti-analysis techniques as they …
![find](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094457/find-400x200.jpg)
Researchers develop new technique to identify malware in embedded systems
A technique for detecting types of malware that use a system’s architecture to thwart traditional security measures has been developed by researchers from North Carolina …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094909/criminal2-400x200.jpg)
Cybercriminals are becoming more methodical and adaptive
Cybercriminals are deviating towards a more focused approach against targets by using better obfuscation techniques and improved social engineering skills as organizations …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Researchers unveil February 2019’s most wanted malware
Coinhive has once again led Check Point’s Global Threat Index for the 15th consecutive month, despite the announcement that its services have been shut down from March …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Mining malware evades agent-based cloud security solutions
Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining …
![flame](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102359/flame-flat-400x200.jpg)
Endpoint security solutions challenged by zero-day and fileless attacks
There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and …
![Windows certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100709/windows-certificate-400x200.jpg)
Underground vendors can reliably obtain code signing certificates from CAs
More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of using stolen (compromised) ones, …
![Apple](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100831/apple-400x200.jpg)
Fooling security tools into believing malicious code was signed by Apple
The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security …
![Google Play malware](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102102/google_play_malware1-400x200.jpg)
Google booted 100,000 malicious developers from Google Play
New malware and unwanted apps are discovered on Google Play nearly every day – or so it seems. According to Google’s statistics, in 2017 the company has taken down …
![Google Play Protect](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103538/google_play_protect-400x200.jpg)
Google Play Protect scans for malicious apps
By now, many Android users that have the Google Play Store app on their devices should be able to find Google Play Protect in it. What is Google Play Protect? Google Play …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112017/labyrinth-400x200.jpg)
Will fileless malware push the antivirus industry into oblivion?
The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105737/danger-400x200.jpg)
Intel’s CHIPSEC can detect CIA’s OS X rootkit
As details about CIA’s hacking capabilities and tools are, bit by bit, popping to the surface, companies are trying to offer users some piece of mind. In the wake of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD