![abstract lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113419/abstract-lights-400x200.jpg)
Public institutions targeted with shape changing Qbot malware
A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations …
![success](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113141/success-400x200.jpg)
Identify the ransomware you’ve been hit with
Michael Gillespie, a coder that has created a password generator for unlocking the files stashed in a password-protected archive by the CryptoHost ransomware, has also created …
![open lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113144/open_lock-400x200.jpg)
CryptoHost locks files, but you can get them back
If you’re a user whose files are held for ransom by the CryptoHost (aka Manamecrypt) ransomware, despair no more about getting them back without paying for it – …
![maktub ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113221/maktub-ransomware-400x200.jpg)
Beware of phishing emails sporting your home address!
The latest (likely very successful) ransomware delivery campaign takes the form of spear-phishing emails targeting specific individuals and, for added credibility, includes …
![samas-ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113333/samas-ransomware-400x200.jpg)
Samas ransomware enters hospitals through vulnerable servers
There’s hardly a day anymore that we don’t hear about a hospital being hit with ransomware. But while most have been infected via phishing emails carrying or …
![payment card](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113353/payment-card-400x200.jpg)
Carders use custom built POS malware to hit US retailers
Crypto-ransomware might be the most prominent type of malware these days, but that doesn’t mean that criminals have stopped using other kinds. According to FireEye …
![petya ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113358/petya-ransomware-featured-400x200.jpg)
Petya ransomware encrypts files, disks, locks users out of computers
A new type of ransomware does not only encrypt the victims’ files, but also their disk’s Master File Table (MFT), and it replaces the boot drive’s existing …
![Windows](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194954/windows-blue-400x200.jpg)
How to block malicious macros for good?
Microsoft is finally doing something about the increasing threat of malicious macros: it has added a new feature in Office 2016 that will block macros from loading in certain …
![facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113615/facepalm-400x200.png)
Cyber crooks spread Surprise ransomware via TeamViewer
A new ransomware family has been encrypting users’ files and appending the .surprise extension to them. The malware itself doesn’t differ much from other similar …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Carbanak cyber-thieves’ newest attacks exposed
The infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111204/twitter-android2-400x200.png)
Android adware infiltrates devices’ firmware, Trend Micro apps
Dubbed Gmobi by Dr. Web researchers, the malware comes in the form of a software development kit (SDK), and has been found in several legitimate applications by well-known …
![Steam](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113514/steam-400x200.jpg)
Boom in Steam account hijacking is due to cheap Steam Stealers
With over 125 million active users, Valve’s Steam is the most popular online gaming platform in the world and, consequently, forms a huge pool of targets for cyber …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?