article thumbnail

Wave of native IIS malware hits Windows servers

CSO Magazine

Security researchers warn that multiple groups are compromising Windows web servers and are deploying malware programs that are designed to function as extensions for Internet Information Services (IIS). How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters !

Malware 135
article thumbnail

APT group hits IIS web servers with deserialization flaws and memory-resident malware

CSO Magazine

A sophisticated, likely government-sponsored threat actor has been compromising major public and private organizations over the past year by exploiting deserialization flaws in public-facing ASP.NET applications to deploy fileless malware. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].

Malware 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gootkit malware creators expand their distribution platform

CSO Magazine

The cybercriminal gang behind the Gootkit Trojan is expanding its malware distribution activities and is improving its multi-stage distribution platform to deliver additional threats. How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! Sign up for CSO newsletters ! ].

Malware 117
article thumbnail

Siloscape malware escapes Windows containers to backdoor Kubernetes clusters

CSO Magazine

Malware attacks against cloud containers are nothing new, but these attacks have primarily focused on Linux deployments because they are the most common and where containers were born. How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! Sign up for CSO newsletters ! ]

Malware 98
article thumbnail

4 most dangerous emerging ransomware threat groups to watch

CSO Magazine

Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters. ] These are AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0. To read this article in full, please click here

article thumbnail

REvil gang suddenly goes silent leaving victims unable to recover systems

CSO Magazine

Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters. ] Meanwhile, victims and the security companies working for them to recover data have been put in a more difficult situation.

CSO 144
article thumbnail

Ransomware recovery: 8 steps to successfully restore from backup

CSO Magazine

Learn how recent ransomware attacks define the malware's new age and 5 reasons why the cost of ransomware attacks is rising. | Get the latest from CSO by signing up for our newsletters. ] Part of the reason is the lack of backups—specifically, the lack of usable backups. To read this article in full, please click here

Backups 145