Remove Malware Remove Phishing Remove Ransomware Remove Spyware
article thumbnail

Threat landscape for industrial automation systems, Q1 2024

SecureList

Diversity of detected malware In the first quarter of 2024, Kaspersky’s protection solutions blocked malware from 10,865 different families belonging to various categories on industrial automation systems. By cybercriminals’ logic, these malicious objects can spread easily. This is also reflected in our statistics.

Spyware 83
article thumbnail

Threat landscape for industrial automation systems. H2 2023

SecureList

By percentage of ICS computers on which spyware was blocked. Regions ranked by percentage of ICS computers on which spyware was blocked, H2 2023 By percentage of ICS computers on which worms were blocked. One of the two regions where the percentage of ICS computers on which spyware was blocked rose in the six-month period.

Spyware 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware en masse on the wane: top threats inside web-phishing in H1 2020

Security Affairs

Web-phishing targeting various online services almost doubled during the COVID-19 pandemic , it accounted for 46 percent of the total number of fake web pages. Downloaders , intended for the installation of additional malware,and backdoors , granting cybercriminals remote access to victims’ computers, also made it to top-3.

Phishing 101
article thumbnail

AI likely to boost ransomware, warns government body

Malwarebytes

The British National Cyber Security Centre (NCSC) says it expects Artificial Intelligence (AI) to heighten the global ransomware threat. The impact is expected to grow for several reasons: AI already helps cybercriminals to compose more effective phishing emails. But that availability will undoubtedly grow.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Malware, short for “malicious software,” is any unwanted software on your computer that, more often than not, is designed to inflict damage. Since the early days of computing, a wide range of malware types with varying functions have emerged. Ransomware. Best Practices to Defend Against Malware. RAM scraper.

Malware 104
article thumbnail

Hackers exploit old Microsoft Vulnerability to drop Zloader Malware

CyberSecurity Insiders

Hackers are found inducing Zloader Malware into Windows machines since November last year and reports are in that the malicious software tool has already targeted over 2,848 victims from 111 countries so far. Highly placed sources say that the malware has been distributed via phishing campaign by a cyber threat group named MalSmoke.

Malware 131
article thumbnail

Phishers prefer Tesla, top 3 malware strains in Coronavirus phishing campaigns

Security Affairs

Group-IB’s CERT-GIB analyzed hundreds of coronavirus -related phishing emails and discovered top malware strains in COVID-19 campaigns. Group-IB’s Computer Emergency Response Team ( CERT-GIB ) analyzed hundreds of coronavirus-related phishing emails between February 13 and April 1, 2020. Source: CERT-GIB. Source: CERT-GIB.

Phishing 100