Top 10 Malware Strains of 2021

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. Here are the top 10 malware strains from 2021: 1. The U.S.

Watch Out For This Android Malware That Factory Resets Your Phone After Stealing Your Money

GizModo VR

Research published earlier this week shows that a nasty Android banking malware has evolved, bringing with it a number of alarming new features—including the ability to factory reset your device after stealing your money.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cybercriminals Bought Facebook Ads for a Fake Clubhouse App That Was Riddled With Malware

GizModo VR

The app is actually a trojan designed to inject malware into your computer. Cybercriminals have been pushing Facebook users to download a Clubhouse app “for PC,” something that doesn’t exist.

An Android App That Promised Free Netflix Shockingly Just Highly Annoying Malware

GizModo VR

malware whatsapp aviran hazum instant messaging clients mobile applications computing operating systems technology internet cross platform software software communication software security breaches google computer virus

Microsoft announces major new Windows 11 security features for 2022

Venture Beast

Microsoft says new Windows 11 security features for 2022 will include new phishing and malware prevention, along with default VBS features. Read More.

Mac malware continuing to escalate, warn security researchers

Computer Weekly

Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes

Hospitals targeted using camouflaged old malware

Computer Weekly

Specialised devices running older versions of operating systems are becoming critical points of cyber attack vulnerability, warns TrapX Security

This Researcher Hacked Into 35 Major Tech Companies, Including Microsoft, Tesla, and Netflix

GizModo VR

Alex Birsan, a Romanian threat researcher, recently made over $130,000 by virtuously breaking into IT systems at dozens of major tech companies. Read more.

Government Agencies Discover New Chinese Malware Strain

SecureWorld News

CISA reports on Chinese malware strain. And it's a malware strain used specifically by the Chinese government. A recent CISA Malware Analysis Report (with contributions from the FBI and DoD), outlines this new malware variant. Keep operating system patches up-to-date.

How to Remove Malware Tips


Malware is an abbreviated term that stands for “malicious software.” What is Malware? There are various types of malware. Malware creation has become popular in recent times due to the the lure of money that can be made through organized Internet crime. Malware originally existed as experiments and pranks, but eventually led to vandalism and destruction of targeted machines. Tips for Spotting Malware. How to Remove Malware.

Fileless malware: The smart person's guide

Tech Republic Security

Fileless malware uses system files and functions native to the operating systems to evade detection and deliver its payload. Learn more about this invisible threat and the best approach to combat it

How to Remove Malicious Code, Malware from Websites?


Information Technology Blog - - How to Remove Malicious Code, Malware from Websites? The main reasons how website get hacked or infected with malware are: Phishing. Malware. Do you want to remove malware, malicious code and from a website and clean it? Malware injections. If you are looking for priority malware removal from WordPress or Joomla, then SiteGuarding will help you to clean within 1-3 hours. Daily vulnerability/malware scan.

Chrome Removed The Great Suspender Extension, But Don't Mourn Your Lost Tabs Just Yet

GizModo VR

Google has reportedly blocked the popular extension The Great Suspender and removed it from its Chrome Web Store for containing malware. But if you were one of the many users who relied on the tab manager to keep your browser running smoothly, don’t freak out just yet.

Malware and Antivirus Systems for Linux


Each computer system may have a malware or viruses, including Linux. It is recommended that users install these antivirus softwares on the Linux operating system that can be downloaded via Internet. In order to better understand antivirus programs, it may be beneficial to firstly understand the malware itself. Although Linux is a highly secure operating system, you can still find viruses on it.

Linux 64

Easy and Reliable Spyware & Malware Remover


Malware is an abbreviated term that stands for “malicious software.” Spyware is an abbreviated term that stands for “spy software” Malicious, spy software is designed for the purpose of gaining access to your computer and often damaging a computer and spreading the malware without the owner knowing. What is Malware? There are various types of malware. Tips for Spotting Malware and Spyware.

Stop Malware Attacks and Online Identity Theft


Malware means a malicious or intrusive software application that is coded for executing on the targeted device without notifying its user or the owner. Affecting a mobile phone, a computer, a laptop, or a network server, malware interrupts computing operations, hijacks networks, or access systems. Acting as purposely malignant, malware is disguised as an authentic application available from an apparently trustworthy source.

Data is the perimeter, defend it that way

Forrester IT

For years, many of us in the cybersecurity industry have been jumping up and down on desks and trying to get the world (writ large) to pay attention to managing and patching outdated systems and operating systems that have been running legacy software, to no avail. The "hack" targets Windows XP systems, an old, outdated, unsupported OS that should have been pulled from use eons ago. malware. Data is the perimeter, defend it that way.

Data 263

Russian Hackers Target Ukrainian Software Company

SecureWorld News

Security researches discovered what they describe as a " fairly uncommon piece of malware," a modified version of the open source backdoor named " GoMet. ". Agents can be deployed on a variety of operating systems (OS) or architectures (amd64, arm, etc.).

Mac malware is found targeting biomedical research

Network World

A Mac malware that’s been spying on biomedical research centers may have been circulating undetected for years, according to new research. The malware, which Apple calls Fruitfly, is designed to take screen captures, access the Mac’s webcam, and simulate mouse clicks and key presses, allowing for remote control by a hacker, Malwarebytes said in a blog post on Wednesday. The security firm said that neither it nor Apple have identified how the malware has been spreading.

New Windows code injection method could let malware bypass detection

Network World

Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems. These special tables are provided by the operating system and can be used to share data between applications.

Is It a Virus or Nagware?

SecureWorld News

Every single electronic device with a microprocessor, operating system, and memory is susceptible to malware. However, what about malware that preys on native functionality but in a malicious way? Featured Featured Author Malware

How Many User Credentials Did Emotet Steal? Now We Know

SecureWorld News

In January 2021, the FBI and other international law enforcement agencies worked together to take down one of the world's most notorious malware strains, Emotet. Keep operating systems and software patched.". Featured FBI Original Content Malware Cybercrime / Threats

MEDJACK 2: Old malware used in new medical device hijacking attacks to breach hospitals

Network World

Attackers are packaging the newest and most sophisticated attack tools in long out-of-date malware wrappers, targeting medical devices running legacy operating systems, to breach hospital networks for advanced persistent attacks. Last year, TrapX Security revealed how attackers were infecting medical devices with malware, then moving laterally through hospital networks to steal confidential data.

New Windows XP patch: Microsoft issues extraordinary fix to protect PCs against next WannaCry

Tech Republic Security

To limit the number of machines at risk from self-replicating malware like WannaCry, Microsoft yesterday patched vulnerabilities on Windows XP and other unsupported operating systems

HP pushes out BIOS update addressing high-severity vulnerability affecting 200+ models


As reported by Bleeping Computer, HP has issued an advisory over potential security vulnerabilities that could allow arbitrary code execution with Kernel privileges, which would enable hackers to access to a device's BIOS and plant malware that can't be removed by traditional antivirus software or reinstalling the operating system.

Global Effort Seizes EMOTET Botnet

SecureWorld News

To severely disrupt the EMOTET infrastructure, law enforcement teamed up together to create an effective operational strategy. It basically works as a primary door opener for computer systems on a global scale. Europol also stresses that EMOTET was so much more than just malware.

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division


in new contracts for advanced cybersecurity projects for defense and federal government agencies in the areas of cloud-based advanced malware analysis, spear-phishing attacks against Android, and big data analytics for compromise detection. Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence. By Bob Gourley. Editor’s note: I have remarked before how proud I am to be on the Invincea advisory board.

Security News: @Invincea Raises $16 Million in C-Series Funding Led by Aeris Capital and Dell Ventures


an innovator in the use of secure virtual containers for advanced malware threat detection, breach prevention and forensic threat intelligence, today announced that it has raised $16M in a Series C equity round led by new investors Aeris Capital and Dell Ventures with participation from existing investors Grotech Ventures, Harbert Ventures, and New Atlantic Ventures. Cyber Security Anup Ghosh Dell invincea Malware Microsoft Office New Atlantic Ventures Sandboxie Small business

Dell 216

North Korean bugs allow remote access

IT Manager Daily

North Korean malware can jeopardize sensitive data – here’s the latest. Threat: Two families of malware, Joanap and Brambul, have been used by the North Korean government to enable network exploitation. The malware can harvest system info and generate and execute a suicide script. Brambul is often installed onto a network by dropper malware. In this week's e-newsletter IT Security malware remote access

Update Your Mac Right Now to Avoid This Massive Security Bug

GizModo VR

A recently patched zero-day vulnerability in macOS operating systems has been allowing hackers to bypass much of Apple’s security protocols and deploy malware on an unknown amount of computers, new research shows. If you haven’t already, you should update your Mac right now.

Trend Micro found several security flaws in the Android version of ShareIt


Android malware is nothing new for fans of Google's mobile operating system, but a set of newly discovered vulnerabilities in a popular app called ShareIt is just as worrisome.

How to manually update Microsoft Defender

Computerworld Vertical IT

Microsoft Defender is the built-in anti-malware package that’s included with modern Windows operating systems. It’s alternatively known as Windows Security (it shows up under Settings as Windows Security) or Windows Defender (sometimes with Antivirus at the end of the name, as in this Microsoft Docs page ). But whatever you want to call it, for many Windows users, this tool is the go-to default for handling security on their PCs.

Microsoft unleashes ‘Death Star’ on SolarWinds hackers in extraordinary response to breach


Now witness the firepower of this fully armed and operational Battle Station.” – Emperor Palpatine, Return of the Jedi. The attackers used this compromised build server to insert backdoor malware into the product ( called Solorigate by Microsoft or SUNBURST by FireEye).

Mozilla has defeated Microsoft’s default browser protections in Windows

The Verge

This circumvents Microsoft’s anti-hijacking protections that the company built into Windows 10 to ensure malware couldn’t hijack default apps. All operating systems should offer official developer support for default status so people can easily set their apps as default.

Lazarus APT Targeting Cryptocurrency, CISA Warns

SecureWorld News

The threat actors use social engineering to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. The U.S.

Pwn2Own hacking contest ends with two virtual machine escapes

Network World

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system. Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main operating system in case of compromise.

Microsoft issues fixes for non-supported versions of Windows Server

Network World

CVE-2019-0708 is pre-authentication and requires no user interaction, meaning any future malware could self-propagate from one vulnerable machine to another. It does not impact Microsoft’s newest operating systems; Windows 8 through 10 and Windows Server 2012 through 2019 are not affected. Microsoft took the rare step of issuing security fixes for both the server and desktop versions of Windows that are long out of support, so you know this is serious.

Top 5 Internet Security Tips


Internet security has become a hot topic of debate today, and his really comes as little surprise given the large amounts of devastating malware attacks users are experiencing all around the globe. With the advancement of technology, so has the complexity and sophistication of malware grown to the point where people have needed to take drastic measures in order to safeguard their devices and personal information against such malicious threats.

Microsoft’s new Android antivirus app is now available in preview

The Verge

The public preview for Android will include protection against phishing and go a step further than Google’s built-in malware protection to offer signature-based malware detection. Microsoft is launching a preview version of its antivirus software for Android today.

Technology Short Take 158

Scott Lowe

A “highly evasive” Linux malware named OrBit has emerged; see here for more details. Operating Systems/Applications. Welcome to Technology Short Take #158! What do I have in store for you this time around? Well, you’ll have to read the whole article to find out for sure, but I have links to articles on…well, lots of different topics! DNS, BGP, hardware-based security, Kubernetes, Linux—they’re all in here.

The Best Free Antivirus Software for Windows 7-10


Presently, most expert clients or partnerships will swing to paid security solution with a specific end goal to ensure each product inch of their system and individual PCs. What you’ll get with this instrument are a definitive hostile to malware and against phishing protection. Fundamentally, premium protection for nothing with top outcomes from different autonomous testing labs concerning malware recognition and anti-phishing security. Malwarebytes Anti-Malware.

Ransomware Detection at Chip Level? Yes, Says Intel

SecureWorld News

Even when ransomware infiltrates a system, Intel vPro platform PCs with Intel Hardware Shield can help restrict lateral movement with hardware-enforced isolation of virtualized containers, memory protections, secure boot and below the OS firmware security.”.

Intel 53

Defeating Worms And Viruses


A virus is a self- replicating, malicious application that can easily penetrate an operating system with the sole purpose of spreading harmful programming codes. They can also utilize the errors in a network configuration as well as the loopholes of the security application and operating systems. Errors in your operating system and the appearance of error messages. Users must always update the version of their operating system and security patches.