![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111248/danger-2-400x200.jpg)
Phishing, malware, and cryptojacking continue to increase in sophistication
Attackers are constantly trying new ways to get around established defenses. The data, collected throughout 2017 by Webroot, illustrates that attacks such as ransomware are …
![Atlanta](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101539/atlanta-biohazard-400x200.jpg)
Atlanta government systems hit by ransomware
The city of Atlanta has suffered a ransomware attack on Thursday, which resulted in outages of some of its customer facing applications, including some that customers may use …
![biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112826/biohazard-400x200.jpg)
1 in 10 targeted attack groups use malware designed to disrupt
Cyber criminals are rapidly adding cryptojacking to their arsenal and creating a highly profitable new revenue stream, as the ransomware market becomes overpriced and …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111946/danger-400x200.jpg)
Malware leverages web injects to empty users’ cryptocurrency accounts
Criminals trying to get their hands on victims’ cryptocurrency stashes are trying out various approaches. The latest one includes equipping malware with …
![Android apps](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104618/android-apps-400x200.jpg)
Malicious apps in app stores decrease 37 percent
Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113423/world-400x200.jpg)
Malicious activity surges coincide with geopolitical events
Comodo released its Global Malware Report 2017, which culminates a year of security analysis and research into threat patterns. Among its major findings: 2017 was a year of …
![bomb](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112750/bomb-400x200.jpg)
Record surges in healthcare attacks, fileless malware, cryptocurrency mining
During Q4 2017, McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 …
![Skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103817/skull-ascii-400x200.jpg)
Not all who pay a ransom successfully recover their compromised data
A new report by the CyberEdge Group found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016. How victims …
![sharing](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101707/sharing-400x200.jpg)
Intelligence sharing is crucial in the fight against cybercrime
Malware variants previously focused on the financial sector are now successfully attacking non-banking targets, according to Blueliv. A higher level of collaboration and …
![One](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101715/one-400x200.jpg)
Cyber attacks becoming No. 1 business risk
SonicWall recorded 9.32 billion malware attacks in 2017 and saw more than 12,500 new Common Vulnerabilities and Exposures (CVE) reported for the year. “The cyber arms race …
![wallet](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102045/wallet-400x200.jpg)
Cryptocurrency-stealing malware relies on victims copy-pasting wallet info
An unconventional email spam campaign has been delivering unusual cryptocurrency-stealing malware to American and Japanese users. The emails are sporting “Re: …
![cryptocurrency](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101752/cryptocurrency-400x200.jpg)
Cryptojacking is the new malware
The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which these currencies are earned. At its core, mining …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?