article thumbnail

Wave of native IIS malware hits Windows servers

CSO Magazine

Security researchers warn that multiple groups are compromising Windows web servers and are deploying malware programs that are designed to function as extensions for Internet Information Services (IIS). How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters !

Malware 135
article thumbnail

Gootkit malware creators expand their distribution platform

CSO Magazine

The cybercriminal gang behind the Gootkit Trojan is expanding its malware distribution activities and is improving its multi-stage distribution platform to deliver additional threats. How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! Sign up for CSO newsletters ! ].

Malware 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Siloscape malware escapes Windows containers to backdoor Kubernetes clusters

CSO Magazine

Malware attacks against cloud containers are nothing new, but these attacks have primarily focused on Linux deployments because they are the most common and where containers were born. How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! Sign up for CSO newsletters ! ]

Malware 98
article thumbnail

APT group hits IIS web servers with deserialization flaws and memory-resident malware

CSO Magazine

A sophisticated, likely government-sponsored threat actor has been compromising major public and private organizations over the past year by exploiting deserialization flaws in public-facing ASP.NET applications to deploy fileless malware. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].

Malware 145
article thumbnail

Over 60,000 Android apps infected with adware-pushing malware

CSO Magazine

Bitdefender has uncovered a hidden malware campaign living undetected on mobile devices worldwide for more than six months. To read this article in full, please click here The campaign is designed to push adware to Android devices with the purpose of driving revenue.

Adware 139
article thumbnail

4 most dangerous emerging ransomware threat groups to watch

CSO Magazine

Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here These are AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0.

article thumbnail

Ransomware recovery: 8 steps to successfully restore from backup

CSO Magazine

Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here Part of the reason is the lack of backups—specifically, the lack of usable backups.

Backups 145