![finance biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104705/finance-biohazard-400x200.jpg)
How the Necurs botnet influences the stock market
After a three-months-long partial hiatus, the Necurs botnet is back to flinging spam emails left and right. But unlike before the break, when it was mostly delivering the …
![password unlock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113031/password-unlock-400x200.jpg)
Organizations still vulnerable to brute force attacks
While increases in malware are clearly a major threat to both enterprises and service providers, network complexity is creating its own vulnerability, according to Ixia. The …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113844/attacks-400x200.jpg)
Fileless attack framework was used in many recent attacks
In the last month or so, a number of security companies spotted attackers targeting a variety of organizations around the world with spear-phishing emails delivering …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Organizations hit with Petya ransomware with a twist
Various organizations are being targeted by cyber crooks leveraging the infamous Petya ransomware. A modified Petya version inside a Trojan But victims will have a difficult …
![Biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112119/biohazard-400x200.jpg)
Top five most wanted malware families worldwide
The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point. The downloader, that installs …
![danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105737/danger-400x200.jpg)
Intel’s CHIPSEC can detect CIA’s OS X rootkit
As details about CIA’s hacking capabilities and tools are, bit by bit, popping to the surface, companies are trying to offer users some piece of mind. In the wake of …
![Cybereason RansomFree](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105053/cybereason-ransomfree-400x200.jpg)
Catch emerging strains of ransomware with RansomFree
In this podcast recorded at RSA Conference 2017, Yoel Eilat, Senior Product Manager at Cybereason, talks about RansomFree – the free, anti-ransomware protection …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Clever spear-phishing emails hit employees involved in SEC filings
FireEye has flagged a sophisticated spear-phishing campaign hitting US-based businesses with emails purportedly coming from the US Securities and Exchange Commission (SEC). …
![Dome9](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104905/dome9-computer-400x200.jpg)
Fighting attackers in the era of data jacking
In this podcast recorded at RSA Conference 2017, Zohar Alon, CEO at Dome9 Security, talks about how attackers can compromise systems with valuable data that are either on-prem …
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104859/dislike-400x200.jpg)
Trojanized Facebook Lite steals info, installs apps
A Trojanized Facebook Lite app for Android has been found stealing device information and installing malicious apps in the background. How can this happen? There is some …
![world biohazard](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112821/world-biohazard-400x200.jpg)
StoneDrill: New wiper targets Middle East, shows interest in Europe
Kaspersky Lab has discovered a new sophisticated wiper malware, called StoneDrill. Just like another infamous wiper, Shamoon, it destroys everything on the infected computer. …
![Trojan](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104913/trojan_horse-400x200.jpg)
DNSMessenger backdoor/RAT uses DNS queries to communicate with C&C server
How to make sure that your malware will be able to communicate with its C&C servers even if the infected machine sits behind a company firewall and traffic to and from …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?