article thumbnail

Researchers find new ICS malware toolkit designed to cause electric power outages

CSO Magazine

A new addition to this arsenal is a malware toolkit that seems to have been developed for red-teaming exercises by a Russian cybersecurity company. COSMICENERGY is the latest example of specialized OT malware capable of causing cyber physical impacts, which are rarely discovered or disclosed," the Mandian researchers said in their report.

Malware 111
article thumbnail

Iranian APT targets aerospace and telecom firms with stealthy ShellClient Trojan

CSO Magazine

The goal of the attacks is the theft of information about the victims' infrastructure, technology and critical assets. [ How well do you know these 9 types of malware and how to recognize them. Sign up for CSO newsletters ! ] To read this article in full, please click here

CSO 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New cryptomining malware targets AWS Lambda

CSO Magazine

Malware authors are keeping with the times and when it comes to server-oriented malware. Specifically, attackers will adopt the same technologies their target organizations are using. To read this article in full, please click here

Malware 107
article thumbnail

5 Top Questions About Deception Technology in Cybersecurity

SecureWorld News

Your questions about deception technology in cybersecurity, answered. What exactly is deception technology and how can it play a vital part in your cyber defense? How do you define deception technology? The old word for deception technologies is honeypot. The old technology really no longer applies.

article thumbnail

Malware explained: Definition, examples, detection and recovery

CSO Magazine

What is malware? Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs attackers use to wreak destruction and gain access to sensitive information. How does malware spread and get on your device?

Malware 92
article thumbnail

OPSWAT launches new malware analysis capabilities for ICS, OT networks

CSO Magazine

Critical infrastructure cybersecurity vendor OPSWAT has announced new malware analysis capabilities for IT and operational technology (OT).

Malware 84
article thumbnail

Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger

CSO Magazine

Researchers have discovered a new multi-stage malware delivery campaign that relies on legitimate application installers distributed through popular software download sites. The malicious payload delivery, which includes a cryptocurrency mining program, is done in stages with long delays that can add up to almost a month.

Malware 109