Search Results
1,426 results
Your search is now limited to «Malware» expert search.
PR Newswire 01/22/2019 08:45
BALTIMORE, Jan. 22, 2019 /PRNewswire/ -- Light Point Security, the pioneer of Browser Isolation, today announced the results of a study investigating challenges faced by enterprise security teams due to web-borne threats and how they can address these challenges.
More from PR Newswire:
ITProPortal 01/22/2019 08:30
Metric Labs claims that out of the top free 150 VPN apps found on Google's Play Store, 27 were flagged as potential sources for malware.
More from ITProPortal:
ZDNet 01/22/2019 07:41
Long live Emotet, the malware king! This is what the URLhaus project has been tracking over the past ten months, building a database of all these new malware distribution URLs.
More from ZDNet:
State of Security 01/22/2019 07:33
STOP ransomware is using adware installers disguised as cracks as a new method of distributing itself to unsuspecting users.
More from State of Security:
GBHackers On Security 01/22/2019 05:47
CryptoMix ransomware (old ransomware spotted early in 2016) returns with a new trick, ripping data and images from crowdfunding sites and claiming ransomware payments go to the needy.
More from GBHackers On Security:
BetaNews 01/22/2019 05:25
Among the report's other findings are that 33 percent of organizations worldwide have been hit by mobile malware, with the leading three malware types targeting Android.
More from BetaNews:
Fossbytes 01/22/2019 01:17
But a new report suggests that the top free VPN apps are actually home to many privacy leaks and malware.
More from Fossbytes:
Slashdot 01/21/2019 19:20
An anonymous reader quotes a report from ZDNet: A prolific cybercrime gang behind a series of ransomware attacks is distributing a new form of the file-encrypting malware which combines two well known and successful variants in a series of attacks against businesses around the world.
More from Slashdot: 01/21/2019 19:14
ID Ransomware Submission A common practice used by sites that distribute software cracks is to utilize adware bundles in order to generate revenue.
More from
No summary found
More from Proofpoint - Threat Insight blog:
Palo Alto Networks’ cyberthreat intelligence team, Unit 42, recently unearthed a new malware related to the Linux cryptocurrency mining malware Xbash.
More from Solutions Review Technology News:
Hacker News 01/21/2019 10:37
Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious activities. Cybersecurity researchers have now spotted a new malware attack campaign linked to the notorious DarkHydrus APT group that uses Google Drive as its command-and-control (
More from Hacker News:
Information Security Buzz 01/21/2019 09:45
BlackRouter Ransomware Promoted As A RaaS By Iranian Developers.
More from Information Security Buzz:
PhishMe 01/21/2019 09:28
Cofense™ recently found a phishing campaign that hides the Kutaki malware in a legitimate application to bypass email gateways and harvest users’ credentials.
More from PhishMe:
Linux Journal 01/21/2019 09:24
Security researchers at Palo Alto Networks' Unit 42 have discovered malware that targets Linux servers to mine cryptocurrency.
More from Linux Journal:
IT World Canada 01/21/2019 08:16
If the phone isn’t moving, the malware won’t run.
More from IT World Canada:
Schneier on Security 01/21/2019 07:47
Two Google Play apps recently caught dropping the Anubis banking malware on infected devices would activate the payload only when motion was detected first.
More from Schneier on Security:
SC Magazine - UK 01/21/2019 07:38
APT group Dark Hydrus has launched a new malware campaign, adopting an updated version of the RogueRobin Trojan and using Google Drive as an alternative channel of communication with it.
More from SC Magazine - UK:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications