article thumbnail

BrandPost: Scary Cyber Threats and Sweet Solutions

CSO Magazine

These are the names of top malware that could be haunting your programs and email right now! Building a cyber defense plan may seem scary. What is even scarier: Not having systems in place to protect against malware and other cyber threats. Cyber Threats That Frighten Even The Experts. They should.

article thumbnail

AI-automated malware campaigns coming soon, says Mikko Hyppönen

CSO Magazine

He has also recently published a book, If It’s Smart, It’s Vulnerable , where he explains how the growth of internet connectivity has fueled cyber threats. To read this article in full, please click here

Malware 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Massive threat campaign strikes open-source repos, Sonatype spots new CursedGrabber malware

Security Affairs

Sonatype’s deep dive research allowed to identify a new family of Discord malware called CursedGrabber. This follows on the heels of last week’s news when Sonatype’s Nexus Intelligence engine and it’s release integrity algorithm discovered discord.dll : the successor to “ fallguys ” malware and 3 other components. and ac-addon.

Malware 132
article thumbnail

M&A Trending In Cybersecurity Industry Vertical For 2022

CyberSecurity Insiders

According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. Top cybersecurity M&A deals for 2021 | CSO Online. Are the applications configured correctly, is there any hidden malware, are there risky legacy programs attached to the applications? In fact, the volume of U.S.

article thumbnail

BrandPost: CIS Hardened Images Built on Google Cloud’s Shielded VMs

CSO Magazine

Today, attackers use various types of malware to target organizations' cloud environments. Those threats include rootkits and bootkits. According to Malwarebytes , rootkits are tools through which cyber threat actors (CTAs) can achieve root (i.e.

article thumbnail

BrandPost: Endpoint Security: Protecting Your Distributed Workforce From Old and New Threats

CSO Magazine

At the same time more employees are working from home and other remote locations, cyber threats against their devices are on the rise. The attacks are becoming more insidious, such as malware that modifies itself to infiltrate a system and hit a specific target, along with attacks directed at firmware.

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Utilize real-world examples, case studies, and industry benchmarks to drive home the importance of investing in cybersecurity defense and creating a culture where everyone plays a role in protecting the organization from cyber threats.