CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Malware
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Malware

Network servers in a data center showing wiper malware and backup and recovery
Cyber SecurityInsights

Avoid a Wipeout: How To Protect Organisations From Wiper Malware

January 26, 2023
The increasing spread of wiper malware is a stark reminder of the dangerous landscape organisations face when protecting their data. A solid, well-managed data backup and recovery plan is the key to ensuring data safety in the face of today’s growing array of threats.
Read More
Hacker hands using laptop with glowing brain showing ChatGPT malware
Cyber SecurityNews

Functioning Malware Written by ChatGPT Spotted on Dark Web Says Check Point Research

January 12, 2023
Dark web forum posts indicate that low- or even no-skill threat actors have figured out how to manipulate ChatGPT instructions to get it to produce basic but viable malware.
Read More
Hacker working on computer showing search engine ads used for malware and phishing
Cyber SecurityNews

FBI: Hackers Are Using Search Engine Ads for Phishing and Malware Distribution

January 6, 2023
The FBI warned that hackers are using search engine ads for phishing and spreading malware to unsuspecting users by impersonating legitimate businesses and services.
Read More
Hand holding game controller showing 2K Games helpdesk system breached to send malware
Cyber SecurityNews

Hacker Gained Access to 2K Games Helpdesk System, Used Customer Service Tickets To Send Malware Links to Players

September 27, 2022
2K Games accounts used for online games may have received unexpected messages from the helpdesk system claiming to be a response to a request. The messages look authentic, but conclude with a link to RedLine malware.
Read More
Malware warning sign on screen showing novel cyber threat techniques
Cyber SecurityInsights

Malware Madness: Understanding the Evolving Malware Landscape & Novel Threat Techniques

September 2, 2022
Attackers are becoming savvier, using search engine optimization (SEO) techniques to bump malicious links and malware to the top of users’ search engine results. Email, SMS, messaging apps, and social media are also commonly used to lure users.
Read More
Telegram app on a smartphone showing malware and messaging apps
Cyber SecurityNews

Hackers Exploit Messaging Apps To Distribute Malware and Store Stolen Data

August 5, 2022
Intel 471 researchers found that hackers leveraged messaging apps and their infrastructure to distribute malware, steal and store data, and deliver malicious payloads.
Read More
Close-up NPM package showing malware
Cyber SecurityNews

Bug Allows Malware Authors To Add Reputable Contributors To Malicious NPM Packages Without Their Knowledge or Consent

May 10, 2022
Security researchers discovered a “package planting” flaw that allows malware developers to add respected open-source contributors to malicious NPM packages without notification or approval.
Read More
Chain consisting of connections showing blockchain companies targeted by Lazarus APT
Cyber SecurityNews

North Korea’s Lazarus APT Is Targeting Blockchain Companies With Crypto-Stealer Malware

April 29, 2022
Lazarus APT targets the employees of blockchain companies with fake job offers, tricking them into downloading trojanized apps that steal security keys and make fraudulent transactions.
Read More
High factory structure and tower cranes showing malware targeting industrial control systems
Cyber SecurityNews

US Intelligence Agencies: New Malware Kit Specifically Targets Industrial Control Systems, Crafted by State-Backed APT Groups

April 18, 2022
US intelligence agencies have issued a public warning indicating that APT groups have developed a "mutli-tool" malware kit that targets a commonly used range of industrial control systems.
Read More
Virus background against digital Russian flag showing Russian GRU botnet malware
Cyber SecurityNews

The FBI Disrupted Russian GRU Botnet Malware Through a Court Order Before It Could Be Weaponized

April 15, 2022
The operation disrupted Russian GRU control over infected devices by removing Cyclops Blink botnet malware from the infected WatchGuard Firebox devices used as command-and-control (C2) servers.
Read More
Load More

Latest

Airline passengers in an international airport showing no fly list in data leak

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

Yellow crime scene tape on computer keyboard showing law enforcement operations on Hive ransomware gang

Hive Ransomware Shut Down by Law Enforcement Operation; FBI in Possession of Decryption Keys, Group’s Public-Facing Website

Woman holding glasses showing data privacy regulations

Navigating the Data Privacy Landscape in 2023

WhatsApp app icon on a smartphone showing GDPR violations

WhatsApp Receives €5.5 Million Fine for GDPR Violations

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results