Top 10 Malware Strains of 2021

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. Here are the top 10 malware strains from 2021: 1. The U.S.

Research: How Malware Weaponized DNA

SecureWorld News

SolarWinds customers around the globe, and their IT networks, welcomed the updates inside as legitimate code. At the start, the first piece of the puzzle is malware that compromises a scientist's device. Eve can easily infect Alice’s vulnerable computers with malware.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How cyber attackers hide malware on your network

Network World

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it

iOS Malware Spoofs Shutdown to Avoid Removal

SecureWorld News

Researchers from security firm ZecOps recently developed a trojan proof of concept (PoC) tool that can fake a shutdown on iPhones, allowing malware to secretly continue living on the device. Featured Apple iPhone Original Content Malware

WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS

Tech Republic Security

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection

Thousands of AT&T Subscribers Infected With Data-Pilfering Malware, Researchers Say

GizModo VR

Unpatched, years-old vulnerabilities in networking devices have allowed a noxious malware to infect thousands of AT&T customers in the U.S., The malware basically functions as a backdoor, one that could allow an attacker to penetrate networks, steal data, and… Read more.

Linux malware is on the rise—6 types of attacks to look for

Network World

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations

'World's Most Dangerous Malware' Botnet Disrupted by Global Police Sting

GizModo VR

entertainment_culture social issues technology_internet security breaches crime computer network security cyberwarfare ransomware emotet cybercrime malware europol botnet computer security ryukThe criminal operation behind a dangerous, global botnet has been disrupted. Read more.

Dell Data Protection Protected Workspace & Malware Prevention


The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The three key points covered in the video are: Attackers, even the low skilled ones, can pass any traditional AV scanners at will – trivial for those infiltrating networks. Individuals take malware and obtain the characteristics pertaining to the individual and find ways to get around the malware inspections in place.

School Gives Malware Infected Laptops to Students

SecureWorld News

Unfortunately, a number of the laptops sent out were discovered to have malware. English students' laptops infected with malware. They say the malware appears to have been contacting Russian servers and has been found in a handful of schools. The U.K.

Majority of malware occurs via HTTPS-encrypted connections


The network security company said that in Q2 2021, 91.5% of malware arrived over an encrypted connection. It added that any company not examining encrypted HTTPS traffic at the perimeter will miss out on 9/10 of all malware.

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

CISA reports on Chinese malware strain. And it's a malware strain used specifically by the Chinese government. A recent CISA Malware Analysis Report (with contributions from the FBI and DoD), outlines this new malware variant. Featured Original Content Malware China

Fileless malware: An undetectable threat

Tech Republic Security

Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it

List of Latest Malware Attacks in the World


Information Technology Blog - - List of Latest Malware Attacks in the World - Information Technology Blog. Malware in different forms has caused serious data loss to users around the world in the last few decades. Latest Malware Attacks in the World.

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

The NotPetya cyberattack crashed networks around the globe, doing billions in damage. But the GRU members being charged in this case started with other strains of malware and a narrow target: Ukraine's power grid. The GRU's Olympic Destroyer malware.

InterContinental Hotel Group reveals extent of malware attack

Computer Weekly

Hotel group InterContinental (IHG) reveals that malware attempting to glean payment card details sat undetected on its network in the US for three months

Hotels 120

Android malware that can infiltrate corporate networks is spreading

Network World

An Android malware is spreading across app stores, including Google Play, and has the capability of stealing sensitive files from corporate networks. DressCode, a family of Android malware, has been found circulating in at least 3,000 Trojanized apps, security firm Trend Micro said on Friday. DressCode hides itself inside games, user interface themes, and phone optimization boosters.

Routers from brands like Asus, Netgear, and Cisco are being targeted by a sophisticated malware campaign


Last year, cyberattacks against corporate networks reached record-setting levels in terms of frequency and size, mostly because of the Log4J vulnerability that was left unpatched by many organizations for several months.

Linux 78

Log4j exploits attempted on 44% of corporate networks; ransomware payloads spotted

Venture Beast

apps Security Software Uncategorized VB Home Page bitdefender category-/Computers & Electronics/Computer Security category-/Science/Computer Science Check Point Cisco Talos cybersecurity Log4j vulnerability malware ransomware

Raindrop Malware Discovered in SolarWinds Breach

SecureWorld News

It has recently been discovered that another strain of malware, Raindrop, was used in the attack. The main difference is that Teardrop is delivered through the Sunburst backdoor, while Raindrop is used to spread across the victim's network.

Microsoft is warning of malware spread via call centers


A post by Palo Alto Networks' Brad Duncan (via ZDNet) explains that BazarLoader provides backdoor access to an infected Windows host.

IDG Contributor Network: Network analysis can find malware before it strikes

Network World

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain in an article on the school’s website.

Compromising a government network is so simple, an out-of-the-box, dark web RAT can do it

Tech Republic Security

Commercially-available malware, with minimal modification, is behind attacks against the Indian government, says Cisco's Talos security research group

New Linux-based ransomware targets VMware servers

Network World

Cheerscript plants double-extortion malware on ESXi servers

Fortinet, Palo Alto Networks, McAfee and Symantec Found the Cyber Threat Alliance


In what could be a very virtuous trend, four of the cyber security industry’s leading tech vendors (Fortinet, Palo Alto Networks, McAfee and Symantec) have established a consortium focused on the furtherance of the art and science of cyber threat intelligence. It’s no longer enough to share and compare yesterday’s malware samples. Palo Alto Networks (NYSE: PANW ). By Bob Gourley.

Five ways to minimize fileless malware infections

Tech Republic Security

Learn how to protect against fileless malware infections, reduce exposure, and prevent the damage from spreading to other networked systems

How to remove malware

Network World

If you've found malware on your system, what should you do about it? This video walks you through the steps of getting the bad stuff off your PC

What is NAC and why is it important for network security?

Network World

Network Access Control (NAC) is a cybersecurity technique that prevents unauthorized users and devices from entering private networks and accessing sensitive resources. NAC tools detect all devices on the network and provide visibility into those devices.

Dark Web sees rise in postings selling access to corporate networks

Tech Republic Security

These postings provide cybercriminals with the information needed to hack into networks where they can infect critical machines with malware, according to Positive Technologies

4 lessons learned from the Atlassian network outage

Network World

Last month, software tools vendor Atlassian suffered a major network outage that lasted two weeks and affected more than 400 of their over 200,000 customers.

CISA warns of credential theft via SolarWinds and PulseSecure VPN

Venture Beast

Cloud Enterprise Security VB Home Page category-/Computers & Electronics/Computer Security category-/Computers & Electronics/Networking/Network Monitoring & Management CISA cyberattack malware Solar Winds VPN

FBI: Conti Ransomware Gang Behind Ireland Attack Also Hit 16 U.S. Health and Emergency Networks

GizModo VR

medical and first responder networks in the past year, according to a Federal Bureau of Investigation alert made public Thursday by the American Hospital Association. ransomware cyberwarfare ryuk cybercrime computing bleeping computer malware crime computer security

IDG Contributor Network: Major cloud is infested with malware, researchers say

Network World

Cloud repositories are actively supplying malware, according to computer experts. The problem being that the resulting malware is quick to “assemble from stored components that individually may not appear to be malicious.” And problematically, it’s insidious and hard to find. Hundreds of buckets have been undermined, says Xiaojing Liao, a graduate student at Georgia Tech who’s the lead author on a study that’s looking into the problem.

Report: 60% of orgs hit by ransomware-as-a-service attacks in the past 18 months

Venture Beast

With ransomware-as-a-service, malware developers lease their code to attackers to do the dirty work of breaking into an enterprise's network. Read More.

Juniper Networks Adds Security Options to Stop Malware and Emerging Threats

Data Center Knowledge

Juniper Networks has announced new advancements to its Spotlight Secure threat intelligence platform. Read More. Shared

Why Malware Prevention Should Be A Priority This Year


Information Technology Blog - - Why Malware Prevention Should Be A Priority This Year - Information Technology Blog. What is Malware? Malware or malicious software is designed to damage or disable computers and can often cause serious damage before they are even detected. Types of malware include spyware, viruses, worms, and Trojans as well as more recently a new way of stealing money called, Ransomware. Malware prevention VS. Malware detection.

How to Protect Your PC from Viruses and Malware


Information Technology Blog - - How to Protect Your PC from Viruses and Malware - Information Technology Blog. Knowing the fact malware threat is not limited to any user base or country, as it is looming large and causing serious data security threat, it becomes important to apply preventive measures. In this article, we have discussed a few simple yet most effective ways to protect your PC from viruses and malware. Use Best Malware Protection Software.

Non-malware attacks are on the rise

Network World

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.

Data-wiping malware strikes Saudi government agencies

Network World

Saudi Arabia's government agencies were hit with a cyberattack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data. Security firms say the attack involved malware called Shamoon or Disttrack that was previously found targeting a Saudi Arabian oil company four years ago.

Researchers find malware samples that exploit Meltdown and Spectre

Network World

Once Google published its findings for the Meltdown and Spectre vulnerabilities in CPUs, the bad guys used that as a roadmap to create their malware. And so far, researchers have found more than 130 malware samples designed to exploit Spectre and Meltdown. It was inevitable.

Why you should build a packet capture device into your network before you build your trust in it


The rise of remote work highlights cybersecurity and ethics issues, making organizations adopt numerous tools to keep businesses safe from hackers, malware, and leaks. Technology & IT Contributors Featured Network packet capture RAID RAIDIX

Tapping Global Threat Intelligence To Secure Enterprise Networks


Tapping Global Threat Intelligence To Secure Enterprise Networks. Register for thisevent to gain knowledge of the perspectives ofCIOs, CISOs and IT security professionals in the public and private sector organizations who are aware that breaches and advanced attacks on their networks are inevitable and therefore they are seeking to improve their detection and response capabilities. . By Bob Gourley. Cyber Security Symposium.

A series of patent lawsuits is challenging the history of malware detection

The Verge

According to OpenText, the companies are using patented technology in their anti-malware applications, specifically in the endpoint security systems that protect specific devices on a network. Illustration by Beatrice Sala.