The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.

The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.
HP Wolf Security Report reveals new techniques and phishing lures used to deceive employees.
Groups LockBit, Hive and BlackCat compromised the network within about two weeks. Apparently, they each use the same hacked RDP connection. Only after the third attack the company approached Sophos for help.
Unknown persons penetrate the company's network. Beforehand, they hacked the Google account of a Cisco employee and obtained VPN access data. The ransomware group Yanluowang claims responsibility for the attack.
The August patchday brings fixes for five critical vulnerabilities. All supported Android versions up to and including Android 12 and 12L are vulnerable. Samsung starts distributing the August updates already in July.
Three quarters of respondents believe recent changes in working practices have had a negative impact on their company's cyber security.
The education sector suffers from the highest data encryption rate and the longest recovery time worldwide.
Weiter anhaltende Lieferprobleme bei Atos - Bundesamt für Bevölkerungsschutz kündigt Freigabe des generalüberholten Sicherheitsfunks jetzt für Oktober an.
Security awareness trainings sensitise the entire team to phishing, ransomware and secure remote working.
RiskIQ has conducted a study on the financial scope of malicious activity on the Internet.
Lockdown Mode is designed to protect users from government hacking attacks. Mode restricts certain functions such as receiving file attachments and Facetime calls.
Group uses technique to bypass blocking of their URLS. Huge growth in phishing attacks compared to 2022.
Leitfaden für Reseller wie sich Sicherheits- und Business-Intelligence-Vorteile erschließen und Kostensteigerungen vermindern lassen.
Trend Micro founds subsidiary for more cyber security in the automotive sector.
The target is a subsidiary of Darmstadt-based energy supplier Entega. The hackers bring the company's website and e-mail system to a standstill. The Mainz municipal utility is also affected.
On average, the attacks caused damage of 2.9 million euros.
Spear phishing attackers use psychological tricks to entice their victims to quickly click on fraudulent mails, warns David Kelm of IT-Seals.
For many employees, being able to work at home on a computer is an advantage. However, remote working does not make IT security any easier.
Voice assistants are practical, but in the home office they pose risks in terms of security and data protection, warns the R+V Versicherung Infocenter.
Recommendation issued jointly by the U.S., Canada, New Zealand, Netherlands and the U.K. provides guidance on mitigating vulnerabilities.
Number of threats detected from malicious Emotet spam campaigns rises 27 per cent.
25 out of 32 apps examined do not even meet the minimum standards. Mozilla rates only two apps as good. Researchers call it the worst product category they've studied so far.
Companies should know the security status of suppliers in the supply chain. But the assessment is complex. Security ratings as a service can provide support. An overview.
Perpetrators break into bank or e-commerce accounts through targeted phishing, malware or man-in-the-middle attacks.
Intel, FiVerity and Fortanix to jointly develop AI-powered fraud detection platform.
Cybercriminals are capable of revealing any password of fewer than 8 characters in just half a minute. How can we avoid it?
BlackCat executable ransomware is highly customizable and supports a number of encryption methods.
Zscaler's annual ThreatLabz report finds phishing-as-a-service to be the reason for the cross-industry increase in attacks worldwide.
Sophos study "State of Ransomware 2022″ shows: The average ransom paid in Germany has almost doubled.
In the defence against cyber attacks, time is both an enemy and an ally. A guest article by Moritz Mann from Open Systems.