![match](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111901/match-400x200.jpg)
Massive ransomware campaign spreading around the world like wildfire
Organizations around the world have been hit with the Wana Decrypt0r (aka WannaCry) ransomware, in what seems to be the most massive ransomware delivery campaign to date. …
![Android O](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104425/androido-400x200.jpg)
Google’s plan to foil screen-hijacking malware in Android O
74% of ransomware, 57% of adware, and 14% of banker malware abuse a specific app permission to target nearly 40 percent of all Android users – by overlaying screens, …
![Handbrake](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104442/handbrake-400x200.jpg)
If you downloaded HandBrake for Mac, you could be infected with Proton RAT
A mirror download server of HandBrake, a popular open source video conversion app for Mac, has been compromised, and the legitimate app .dmg file switched with a Trojanized …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111221/tools-400x200.jpg)
Malware framework using legitimate utilities lobbed at government agencies
Bitdefender researchers have unearthed a previously unknown malware framework that, unlike those used by most APTs, contains many legitimate utilities. Dubbed Netrepser, the …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105016/danger-400x200.jpg)
Turla gets ready to target Mac users
The cyber espionage group deploying the Turla (aka Snake, Uroburos, or Agent.BTZ) malware framework is expected to be able to target Mac users soon. The APT group The group, …
![City](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104459/city_night-400x200.jpg)
Malware Hunter: Find C&C servers for botnets
Recorded Future and Shodan released Malware Hunter, a specialized crawler for security researchers that explores the Internet to find computers acting as remote access trojan …
![Android malware](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110426/android-malware-400x200.jpg)
Super Free Music Player is the latest malware on Google Play
Another day, another piece of malware lurking on Google Play, masquerading as a free and helpful app. This time it’s called “Super Free Music Player” and is …
![trojan](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110844/trojan-1-400x200.jpg)
Dok Mac malware intercepts victims’ web traffic, installs backdoor
A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105859/world-1-400x200.jpg)
200 million financial services records breached in 2016, 900% increase from 2015
The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …
![World target](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110934/world-target-400x200.jpg)
IT service providers, many other orgs targeted in long-standing attack campaign
US-CERT has released an alert warning about a sophisticated attack campaign using multiple malware implants and targeting organizations in the IT, Energy, Healthcare and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112017/labyrinth-400x200.jpg)
Will fileless malware push the antivirus industry into oblivion?
The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113318/danger-400x200.jpg)
Know your enemy: Defining the new taxonomy of malicious emails
Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?