Categories Topics
Malicious Software Controls

Malicious software controls are critical to prevent malicious software (or malware) from being installed on systems and to protect sensitive data. The most common control, Antivirus (AV) software, is a common standard that should be installed on servers and workstations and is used to scan and remove malware from systems and removable media. Additional malicious software controls include network proxy or gateway (anti-malware) devices that can scan incoming e-mail for malware or internet traffic.

For years, Antivirus (AV) software has been a standard used to protect systems from malicious software. AV software should be configured on systems for "on access scanning" to check files received over the network or electronic media before use. Organizations should also ensure they subscribe to third party services to check for up-to-date information on malicious code (e.g. signatures) that can be downloaded to systems for AV protection.

An effective security program should also include anti-malware controls to check for malicious code on the e-mail gateway servers (for inbound e-mail) and entering the network. Internet proxies are also essential to filter, block and log internet user access to websites. Many proxy vendors provide the capabilities to ensure certain websites are restricted by category that may not be commensurate with company policies or may have a higher likelihood of downloading malicious content to company systems. Also, many proxies have filtering capabilities to protect internet download of malicious software. Systems and networks should be configured to ensure all internet traffic routes through proxies to prevent the capability to access internet via other means, futher protecting systems from malicious software and unauthorized disclosure of sensitive information.

Topic Category
Operations and Communications Management
Systems Security
Vulnerability Management
News Articles
Files Encrypted by GandCrab Ransomware Can Now Be Decrypted for Freewww.tripwire.com10/25/2018
Network Outage at Some Recipe Unlimited Locations Caused by Malwarewww.tripwire.com10/3/2018
The makers of the Mirai IoT-hijacking botnet are sentencedwww.tripwire.com9/19/2018
Shipping Company Struck by Ransomware Attackwww.tripwire.com7/27/2018
Atlanta Ransomware Attack Wiped Out Years of Police Dashcam Footagewww.tripwire.com6/5/2018
PoS Malware ‘TreasureHunter’ Source Code Leakedthreatpost.com5/10/2018
Massachusetts school district caves to ransomware demand, pays $10,000www.scmagazine.com5/1/2018
Legitimate Application AnyDesk Bundled with New Ransomware Variantblog.trendmicro.com5/1/2018
Mirai Variant Targets Financial Sector With IoT DDoS Attacksthreatpost.com4/6/2018
Bitcoin stealing malware distributed on for nearly a yearwww.scmagazine.com3/14/2018
OceanLotus ships new backdoor using old trickswww.welivesecurity.com3/13/2018
Warning as Mac malware exploits climb 270%www.computerworld.com3/12/2018
CCleaner Attackers Intended To Deploy Keylogger In Third Stagethreatpost.com3/12/2018
Another Ransomware Variant Strikes Colorado DOT Days after Initial Attackwww.tripwire.com3/2/2018
Sophisticated RedDrop Malware Targets Android Phonesthreatpost.com3/1/2018
Australia also points finger at Russia for NotPetyawww.zdnet.com2/15/2018
‘Olympic Destroyer’ Malware Behind Winter Olympics Cyberattack, Researchers Saythreatpost.com2/12/2018
LuminosityLink spyware giving attackers total control of your PC is taken out by copswww.zdnet.com2/5/2018
Ploutus.D Malware Variant Used in U.S.-based ATM Jackpotting Attacksthreatpost.com1/29/2018
Engineering Firm Pays $1.3K after Ransomware Affects Servers, Backupswww.tripwire.com1/23/2018
Malware Dev Charged with Spying on “Thousands” of Users for 13 Yearswww.tripwire.com1/11/2018
Facebook and Microsoft independently stopped North Korean cyberattacks last week, a US official sayswww.cnbc.com12/19/2017
UK firms 'stockpile' Bitcoin to pay off ransomware hackerswww.zdnet.com12/18/2017
The Mirai botnet: three men plead guilty after weaponizing the Internet of Thingswww.tripwire.com12/14/2017
Canadian Business Banking Customers Hit With Targeted Phishing, Account Takeover Attackssecurityintelligence.com11/22/2017
Malicious Chrome extension steals all datawww.helpnetsecurity.com10/30/2017
UK Blames North Korea for Cyberattack That Crippled Hospitalswww.securityweek.com10/27/2017
Bad Rabbit ransomware attack bites Europewww.cnet.com10/25/2017
PornHub visitors hit with malware attack via poisoned adswww.grahamcluley.com10/10/2017
Malware Fools Users with Fake Document While It Steals Their Passwordswww.tripwire.com10/5/2017
Oral Surgery Center Notifies 128K Patients of Ransomware Attackwww.tripwire.com9/28/2017
New BankBot Android Malware Variant Exclusively Targets Google Playwww.tripwire.com9/26/2017
An Elaborate ATM Threat Crops Up: Network-based ATM Malware Attacksblog.trendmicro.com9/26/2017
Spoofed IRS notice delivers RAT through link updating trickwww.helpnetsecurity.com9/22/2017
Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malwarewww.fireeye.com9/20/2017
Red Alert 2.0: New Android banking trojan can block and log incoming calls from bankswww.tripwire.com9/19/2017
CCleanup: A Vast Number of Machines at Riskblog.talosintelligence.com9/18/2017
Targeted Attack Uses Word Docs to Collect Info about Installed Softwarewww.tripwire.com9/18/2017
Kedi RAT Phones Transmits Data to Attackers Using Gmailwww.tripwire.com9/14/2017
1.65M Users Victimized by Cryptocurrency Miner Threats So Far in 2017www.tripwire.com9/12/2017
VMware adds whitelist security to the hypervisorwww.networkworld.com9/11/2017
Cancer Treatment Center Notifies 19K Patients of Ransomware Attackwww.tripwire.com9/1/2017
711 million email addresses ensnared in 'largest' spambotwww.zdnet.com8/29/2017
WannaCry ransomware attack at LG Electronics takes systems offlinewww.zdnet.com8/21/2017
Ransomware Strikes Kiosks at South Korean LG Service Centerswww.tripwire.com8/17/2017
Maersk Shipping Reports $300M Loss Stemming from NotPetya Attackthreatpost.com8/16/2017
Google wants iOS Gmail users to think twice about following suspicious linkswww.helpnetsecurity.com8/14/2017
Ransomware turns even nastier: Destruction, not profit, becomes the real aimwww.zdnet.com8/9/2017
WannaCry Hero Arrested, One of Two Charged with Distribution of Kronos Malware:threatpost.com8/3/2017
Malware Attack Disrupts Merck's Worldwide Operationswww.securityweek.com8/1/2017
Trickbot Malware Now Targets US Banksthreatpost.com7/24/2017
OSX Malware Linked to Operation Emmental Hijacks User Network Trafficblog.trendmicro.com7/10/2017
Decryption Key to Original Petya Ransomware Releasedthreatpost.com7/7/2017
Servers of MeDoc Maker Seized by Police Following NotPetya Outbreakwww.tripwire.com7/5/2017
UK Parliament launches inquiry into NHS WannaCrypt
Ukraine calls out Russian involvement in Petyawww.zdnet.com7/3/2017
Petya ransomware outbreak: Here’s what you need to
SamSam Increases Ransom Demand to $33,000www.securityweek.com6/24/2017
WannaCry Ransomware Infects Australian Traffic Cameras, Human Error Blamedwww.tripwire.com6/22/2017
UCL ransomware attack traced to malvertising
Honda Shut Down Plant Impacted by WannaCrythreatpost.com6/21/2017
Ztorg malware hid in Google Play to send premium-rate SMS texts, delete incoming SMS messageswww.grahamcluley.com6/21/2017
Korean Firm Pays $1M in Ransom after Erebus Ransomware Infectionwww.tripwire.com6/20/2017
IoT Malware Activity Already More Than Doubled 2016 Numbersthreatpost.com6/19/2017
Ransomware attacks: Universities back online after 'zero-day' infectionswww.zdnet.com6/19/2017
North Korea carried out the WannaCry ransomware attack, say security serviceswww.zdnet.com6/16/2017
Linux malware enslaves Raspberry Pi to mine cryptocurrencywww.zdnet.com6/8/2017
Russian malware controls hiding in plain sight — on Britney Spears' Instagram pagewww.zdnet.com6/8/2017
WannaLocker – The WannaCry Copycat Targeting Android Users in Chinawww.tripwire.com6/8/2017
Microsoft buys security-automation vendor Hexaditewww.zdnet.com6/8/2017
40,000 Subdomains Tied to RIG Exploit Kit Shut Downthreatpost.com6/5/2017
Jaff Malware Probe Uncovers Link to Cybercrime Marketplacethreatpost.com6/3/2017
QakBot Banking Trojan Causes Massive Active Directory Lockoutssecurityintelligence.com6/3/2017
WannaCry Development Errors Enable File Recoverythreatpost.com6/1/2017
Financial malware more than twice as prevalent as
Another Ransomware Nightmare Could Be Brewing in Ukrainewww.wired.com5/19/2017
Ransomware attack: The clean-up continues after WannaCry chaoswww.zdnet.com5/18/2017
Mirai DNS Water Torture finance sector attack dominated Q1: Akamaiwww.zdnet.com5/17/2017
Cryptocurrency miner Adylkuzz attack could be bigger than WannaCrywww.scmagazine.com5/16/2017
NHS hit by 'cyber attack', hospitals across the country shutting
Turla gets ready to target Mac userswww.helpnetsecurity.com5/5/2017
IBM has been shipping malware-infected USB stickswww.grahamcluley.com5/2/2017
New OS X Malware Grants Attackers Access to All Victim Communicationwww.tripwire.com5/1/2017
IBM: Financial services industry bombarded by malware, security threatswww.networkworld.com4/27/2017
OilRig Actors Provide a Glimpse into Development and Testing Effortsresearchcenter.paloaltonetworks.com4/27/2017
Script for remote DoublePulsar backdoor removal availablewww.helpnetsecurity.com4/26/2017
FalseGuide malware dupes 600,000 Android users into joining botnetwww.zdnet.com4/25/2017
Original XPan Ransomware Returns, Targets Brazilian SMBsthreatpost.com4/25/2017
Hackers uncork experimental Linux-targeting
Ransomware hidden inside a Word document that’s hidden inside a PDFnakedsecurity.sophos.com4/24/2017
There's now a tool to test for NSA spywarewww.computerworld.com4/22/2017
Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected deviceswww.zdnet.com4/19/2017
Low-Cost Ransomware Service Discoveredthreatpost.com4/18/2017
Hajime worm battles Mirai for control of the Internet of
Restaurant Chain Confirms Payment Card Breach at 37 Managed Locationswww.tripwire.com4/17/2017
Exploit Kit Activity Quiets, But Is Far From Silentthreatpost.com4/14/2017
Kelihos/Waledac: US law enforcement hits botnet with major
Longhorn: Tools used by cyberespionage group linked to Vault
20,000-bots-strong Sathurbot botnet grows by compromising WordPress siteswww.helpnetsecurity.com4/7/2017
Amnesia botnet targeting DVRs, Palo Alto reportwww.scmagazine.com4/6/2017
Don’t pay for what is for free: Malicious Adobe Flash Player app found on Google Playwww.welivesecurity.com4/4/2017
Fake SEO plugin backdoors WordPress installationswww.helpnetsecurity.com4/3/2017
Point-and-pwn tool for posers dumbs down ransomware
Aviation-Related Phishing Campaigns Seeking Credentialsthreatpost.com3/31/2017
Malspam Campaign Personalizes Emails with Recipient’s Name and Addresswww.tripwire.com3/30/2017
Strange Mirai botnet brew blamed for powerful application layer
Necurs: Mass mailing botnet returns with new wave of spam
Ransomware Families Use NSIS Installers to Avoid Detection, Analysissecuringtomorrow.mcafee.com3/28/2017
Cybercriminals Are Building an Army of Things Creating a Tipping Point for Cybersecurityblog.fortinet.com3/28/2017
Author of Citadel malware, used to steal $500 million from bank accounts, pleads guiltywww.tripwire.com3/23/2017
Malware That Targets Both Microsoft, Apple Operating Systems Foundthreatpost.com3/23/2017
Star Trek-Themed "Kirk" Ransomware Emergeswww.securityweek.com3/17/2017 serves as a conduit for malware - againwww.networkworld.com3/17/2017
Petya-Based PetrWrap Ransomware Emergeswww.securityweek.com3/15/2017
US military leak exposes "holy grail" of security clearance fileswww.zdnet.com3/13/2017
Malware found pre-installed on dozens of different Android deviceswww.grahamcluley.com3/13/2017
Spam campaign targets financial institutions with fake security
New Linux Malware Exploits CGI Vulnerabilityblog.trendmicro.com3/10/2017
Ransomware Attack Strikes Pennsylvania Senate Democratic Caucuswww.tripwire.com3/6/2017
New dark web scheme lets wannabe cybercriminals get in on ransomware - for freewww.zdnet.com3/6/2017
Germans, Czechs served with banking malware through SMSwww.helpnetsecurity.com2/28/2017
Dridex’s Cold War: Enter AtomBombingsecurityintelligence.com2/28/2017
RATANKBA: Delving into Large-scale Watering Holes against Enterprisesblog.trendmicro.com2/27/2017
Shamoon: Multi-staged destructive attacks limited to specific
New crypto-ransomware hits macOSwww.welivesecurity.com2/22/2017
Windows Botnet Helps Mirai Bots Cross Over to Linux Hostswww.tripwire.com2/21/2017
Hackers behind bank attack campaign use Russian decoywww.computerworld.com2/20/2017
Insecure Android apps put connected cars at riskwww.computerworld.com2/17/2017
Shamoon entry point detected, IBM reportwww.scmagazine.com2/17/2017
Proof-of-concept ransomware to poison the water supplywww.welivesecurity.com2/15/2017
XAgentOSX Mac malware linked to Russian hacking groupwww.helpnetsecurity.com2/15/2017
Macro Malware Targets Macssecuringtomorrow.mcafee.com2/14/2017
Researchers create new ransomware to target industrial systemswww.zdnet.com2/14/2017
Mirai Widens Distribution with New Trojan that Scans More Portsblog.trendmicro.com2/13/2017
Windows 10 will soon have a very different security systemwww.networkworld.com2/13/2017
Sage 2.0 ransomware delivered by Pandex spambot, mimics Cerber
Thousands of Android Devices Infected by Marcher Trojanwww.securityweek.com2/13/2017
Attackers target dozens of global banks with new
Unique Office Loader Deploying Multiple Malware Familiesresearchcenter.paloaltonetworks.com2/10/2017
Fast Food Chain Arby’s Acknowledges Breachkrebsonsecurity.com2/9/2017
Hard-to-detect fileless attacks target banks, other organizationswww.computerworld.com2/8/2017
Mac malware, possibly made in Iran, targets U.S. defense industrywww.computerworld.com2/7/2017
Android ransomware repurposes old dropper
Ransomware Attack Causes County to Shut Down IT Systemwww.tripwire.com2/3/2017
Netflix Scam Delivers Ransomwareblog.trendmicro.com1/29/2017
Ransomware locked hotel out of its electronic key lock systemwww.networkworld.com1/29/2017
Police Department Loses Digital Evidence Dating Back to 2009 in Ransomware Attackwww.tripwire.com1/27/2017
"Charger" ransomware removed from Google Playwww.scmagazine.com1/27/2017
Can you trust your Android VPN client?www.helpnetsecurity.com1/26/2017
Google to Block .js Attachments in Gmailthreatpost.com1/26/2017
Linux nasty kicks weak, hacked gadgets when they're already
Data-stealing Android ransomware removed from Google Play storewww.zdnet.com1/25/2017
15 Million People Worldwide Affected by a Single Monero Mining Operationwww.tripwire.com1/25/2017
Cisco WebEx extension opens Chrome users to drive-by malware attackswww.helpnetsecurity.com1/24/2017
HummingBad malware returns in new, more annoying
Sage 2.0 Ransomware Using Malspam and Macros to Infect Windows Userswww.tripwire.com1/24/2017
BankBot created with leaked banking trojan source codewww.scmagazine.com1/23/2017
Greenbug cyberespionage group targeting Middle East, possible links to
Researchers predict upsurge of Android banking malwarewww.helpnetsecurity.com1/23/2017
Israeli soldiers duped into installing malware via fake Facebook profilesnakedsecurity.sophos.com1/23/2017
Researcher offers salvation to souls lost to Satan RaaSwww.scmagazine.com1/20/2017
Satan ransomware-as-a-service starts trading in the Dark Webwww.zdnet.com1/20/2017
Spanish police nab suspect behind Neverquest banking malwarewww.computerworld.com1/20/2017
Unbreakable Locky ransomware is on the march
Spora ransomware could become the new Lockywww.helpnetsecurity.com1/19/2017
China clamps down on app stores in bid to curb malwarenakedsecurity.sophos.com1/19/2017
New Mac backdoor using antiquated codeblog.malwarebytes.com1/18/2017
New RIG Campaign Distributes Cerber Ransomwarewww.securityweek.com1/15/2017
Second Wave of Shamoon 2: Disttrack Can Now Wipe Organizations’ VDI Snapshotswww.tripwire.com1/13/2017
Trojanized Photo App on Google Play Signs Up Users for Premium Servicessecuringtomorrow.mcafee.com1/13/2017
Ransomware, DDoS now top threats as hackers look for big paydayswww.zdnet.com1/11/2017
Spora Ransomware Equipped with Sophisticated Encryption, Payment Sitewww.tripwire.com1/11/2017
Ransomware Attack Leads LA School to Fork Over $28K in Ransomwww.tripwire.com1/10/2017
Malware uses denial-of-service attack in attempt to crash Macswww.zdnet.com1/6/2017
Symantec spots uptick in blocked attacks as new malware variants decreasewww.scmagazine.com1/6/2017
KillDisk now targeting Linux: Demands $250K ransom, but can’t decryptwww.welivesecurity.com1/5/2017
Spy code dormant for three years resurfaces in two new
This ransomware targets HR departments with fake job applicationswww.zdnet.com1/4/2017
Ransomware on smart TVs is here and removing it can be a painwww.networkworld.com1/3/2017
KillDisk Wiper Malware Evolves into Ransomwarewww.tripwire.com12/30/2016
GootKit and Godzilla End 2016 Strong with New Malware Campaignswww.tripwire.com12/29/2016
Android Trojan Performs DNS Hijacking Attacks against Wireless Routerswww.tripwire.com12/28/2016
Cerber Ransomware Spread by Nemucod in Pseudo-Darkleech Campaignwww.tripwire.com12/27/2016
Ticno trojan installs via Windows "save" dialog boxwww.scmagazine.com12/21/2016
New Wave of Hailstorm Spam Pelts Inboxesthreatpost.com12/21/2016
Lean and Mean! Alice Malware Designed Solely to Empty Safe of ATMswww.tripwire.com12/21/2016
New Decryptor Unlocks CryptXXX v3 Filesthreatpost.com12/20/2016
RansomFree Tool Helps Defend Windows PCs against Ransomwarewww.tripwire.com12/20/2016
Evolved DNSChanger malware slings evil ads at PCs, hijacks
Mobile banking trojans adopt ransomware featureswww.computerworld.com12/19/2016
‘Popcorn Time’ Ransomware Sure to Cause Indigestionsecuringtomorrow.mcafee.com12/19/2016
Phishing scam using Microsoft and MasterCard documents as baitwww.scmagazine.com12/16/2016
Latest Intelligence for November
Ransomware Devs Will Decrypt Files for Free if Victims Infect Two Friendswww.tripwire.com12/12/2016
This 'highly personalized' malware campaign targets retailers with phony customer querieswww.zdnet.com12/9/2016
SamSa Ransomware Attacks: A Year in Reviewresearchcenter.paloaltonetworks.com12/9/2016
POS Malware Activity Quadrupled over Thanksgiving Weekendwww.tripwire.com12/8/2016
PowerShell threats surge: 95.4 percent of analyzed scripts were
New Large-Scale DDoS Attacks Follow Schedulethreatpost.com12/5/2016
Never Ever (Ever) Download Android Apps Outside of Google Playwww.wired.com12/4/2016
Major cybercrime network Avalanche dismantled in global takedownwww.computerworld.com12/1/2016
Shamoon: Back from the dead and destructive as
NetWire RAT acts as keylogger, steals payment card datawww.scmagazineuk.com11/30/2016
Mirai botnet attack hits thousands of home routers, throwing users offlinewww.zdnet.com11/29/2016
San Francisco transport system ransomware attacker also extorted other US-based businesseswww.helpnetsecurity.com11/29/2016
Cerber 5.0.1 ransomware spreading via Google and Torwww.scmagazine.com11/29/2016
Mirai: New wave of IoT botnet attacks hits
Ransomware hits San Francisco transport system. Free rides for all as $73,000 demandedwww.tripwire.com11/28/2016
Ransomware scams cost Brits £4.5m per
This cheap and nasty ransomware will try to encrypt files across your network and removable driveswww.zdnet.com11/23/2016
Comodo Detects New Family of Sophisticated Financial Malwareblog.comodo.com11/22/2016
Gatak: Healthcare organizations in the
Malware masquerading as an image spreads via Facebookwww.helpnetsecurity.com11/21/2016
More Androids carry phone-home
New Android Spyware Found Using Former Hacking Team C&C Serverswww.tripwire.com11/17/2016
CryptoLuck Ransomware Infects Victims Using Signed GoogleUpdate.exewww.tripwire.com11/16/2016
Telecrypt ransomware uses Telegram for command and controlwww.helpnetsecurity.com11/10/2016
Cerber Ransomware Now Hunts for Databasessecuringtomorrow.mcafee.com11/4/2016
Microsoft extends support for EMET, but its days are numberedwww.helpnetsecurity.com11/4/2016
McAfee Prepares for Independence With Major Announcementswww.securityweek.com11/3/2016
Computer Virus Cripples UK Hospital Systemkrebsonsecurity.com11/2/2016
Researchers expose Mirai vuln that could be used to hack back against
Microsoft adds macro blocker to Office 2013 to stymie old-school attackerswww.computerworld.com10/27/2016
Symantec, Blue Coat integrate threat intelligence operations, researchwww.zdnet.com10/26/2016
Trick Bot – Dyreza’s successorblog.malwarebytes.com10/24/2016
Microsoft: Beware this fake Windows BSOD from tech support scammers' malwarewww.zdnet.com10/24/2016
Hax0rs sow Discord by using VoIP service to sling malware at
Attackers use Discord VoIP chat servers to host NanoCore, njRAT,
Ghost Push malware continues to haunt Android userswww.tripwire.com10/17/2016
Ransomware Variant XTBL Another Example of Popular Malwareblogs.mcafee.com10/17/2016
NyaDrop exploiting Internet of Things insecurity to infect Linux devices with malwarewww.grahamcluley.com10/17/2016
Dyre banking Trojan successor rears its ugly headwww.networkworld.com10/17/2016
Scam Using Student Loan Forgiveness Spam to Spread Ascesso Malwarewww.tripwire.com10/14/2016
Popular Android App Leaks Microsoft Exchange User Credentialsthreatpost.com10/14/2016
Odinaff: New Trojan used in high level financial
StrongPity APT attack group booby-trapped WinRAR and TrueCrypt downloadswww.computerworld.com10/10/2016
Increased Use of WMI for Environment Detection and Evasionwww.fireeye.com10/7/2016
FastPOS malware goes modular, adds stealth to speedwww.scmagazine.com10/7/2016
Smash and grab PoS pwners ready with pre-Xmas malware
Web-Based Keylogger Used to Steal Credit Card Data from Popular Sitesthreatpost.com10/6/2016
One more bites the dust: Kaspersky releases decryption tool for Polyglot ransomwarewww.zdnet.com10/4/2016
Over 400 instances of Dresscode malware found on Google Play store, say researcherswww.zdnet.com10/3/2016
MarsJoke Ransomware Made into Laughing Stock by Decryption Toolwww.tripwire.com10/3/2016
Helper for Haima iOS App Store Adds More Malicious Behaviorblog.trendmicro.com9/30/2016
Ransomware spreads through weak remote desktop credentialswww.computerworld.com9/30/2016
Android.Lockscreen ransomware now using pseudorandom
Virlock ransomware can now use the cloud to spread, say researcherswww.zdnet.com9/27/2016
Microsoft equips Edge with hardware-based containerwww.helpnetsecurity.com9/27/2016
Sofacy’s ‘Komplex’ OS X Trojanresearchcenter.paloaltonetworks.com9/26/2016
MarsJoke ransomware distributed via Kelihos, targets U.S. state, fed gov't agencieswww.scmagazine.com9/26/2016
Spam is once again on the risewww.helpnetsecurity.com9/22/2016
Malicious websites visited every five seconds by enterprise workers, reportwww.scmagazine.com9/21/2016
Cybercrooks use drive-by malware to rob Reddit users' cryptowalletswww.scmagazine.com9/19/2016
FBI urges ransomware victims to step forwardwww.networkworld.com9/16/2016
Quant Loader trojan downloader spotted in the wildwww.scmagazine.com9/15/2016
DualToy Windows Trojan Attacks Android, iOS Devicesthreatpost.com9/14/2016
Generic OS X Malware Detection Method Explainedthreatpost.com9/13/2016
RAA ransomware now targets businesses, installs data stealing 'Pony' malwarewww.zdnet.com9/13/2016
Macro-based malware evolves to bypass traditional defenseswww.helpnetsecurity.com9/12/2016
Hack Brief: Beware the Spammy Pokemon Go Apps Being Pushed to Millions of iPhoneswww.wired.com9/12/2016
Crafty GovRAT malware targets U.S. gov't employeeswww.computerworld.com9/9/2016
Latest Dridex includes new cryptocurrency targeting and new features to evade detectionwww.scmagazine.com9/9/2016
Latest Intelligence for August
Gugi banking Trojan outsmarts Android 6 securitywww.helpnetsecurity.com9/7/2016
Mirai Linux Trojan corrals IoT devices into DDoS botnetswww.helpnetsecurity.com9/7/2016
Linux rootkit, named for Pokémon's Umbreon, targets Linuxwww.scmagazine.com9/6/2016
40 apps containing DressCode malware family found on Google Playwww.scmagazine.com9/5/2016
Website Down? New FairWare Ransomware Could Be Responsiblewww.tripwire.com8/30/2016
Sophisticated malware possibly tied to recent ATM heists in Thailandwww.computerworld.com8/29/2016
Locky Ransomware Now Downloaded as Encrypted DLLsblog.trendmicro.com8/29/2016
Ramnit Trojan rides again, targets customers of six major UK bankswww.helpnetsecurity.com8/26/2016
Latest Locky version on the loosewww.scmagazine.com8/26/2016
PoS Malware Hits Millennium, Noble House Hotel Chainswww.tripwire.com8/26/2016
Pokémon Go Accounts Targeted by Bogus Pokémon Go Botblog.fortinet.com8/24/2016
GozNym’s Euro Trip: Launching Redirection Attacks in Germanysecurityintelligence.com8/23/2016
Ransomware rise, email scams spread, Flash & IOT vulnerabilities upwww.scmagazine.com8/23/2016
'Massive' Locky ransomware campaign targets hospitalswww.zdnet.com8/19/2016
Google's Santa macOS malware sniffer goes open sourcewww.zdnet.com8/18/2016
Marcher steps up game: Malware poses as security update, imitates popular appswww.scmagazine.com8/17/2016
Non-existent video involving Hillary Clinton and ISIS leader used as bait in malicious
Cerber ransomware rakes in cash by recruiting unskilled hackerswww.computerworld.com8/16/2016
Vawtrak Banking Trojan Adds DGA, SSL Pinningthreatpost.com8/16/2016
Android malvertising campaign discovered delivering Svpeng Trojan through AdSensewww.scmagazine.com8/15/2016
New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Filesblog.trendmicro.com8/14/2016
Ransomware/RAT combo searches for solvent businesseswww.helpnetsecurity.com8/12/2016
Hackers demonstrated first ransomware for IoT thermostats at DEF CONwww.computerworld.com8/8/2016
New ransomware mimics Microsoft activation
Beware of the Cerber2 Ransomware!www.tripwire.com8/5/2016
Orcus – Birth of an unusual plugin builder RATresearchcenter.paloaltonetworks.com8/3/2016
Ransomware rises to strike almost 40 percent of enterprise companieswww.zdnet.com8/3/2016
AdGholas malvertising campaign hid malicious code in images to avoid discoverywww.scmagazine.com7/29/2016
69% of email attacks with malicious attachments in Q2 contained Lockywww.scmagazine.com7/27/2016
Ransomware Incidents at Health Organizations Are Now Classified as a Data Breachwww.tripwire.com7/25/2016
Decryption Tools Released for Bart, PowerWare Ransomwarewww.securityweek.com7/22/2016
Now ransomware is taking aim at business networkswww.zdnet.com7/15/2016
Early-Warning Ransomware Detection Tool Could Help Protect Users Despite Drawbackswww.tripwire.com7/14/2016
SCADA malware caught infecting European energy
Stealthy cyberespionage malware targets energy companieswww.computerworld.com7/12/2016
Malicious Pokémon GO App Spreading DroidJack RATwww.tripwire.com7/11/2016
Android Nougat will stop password-reset ransomwarewww.zdnet.com7/6/2016
This Android malware has infected 85 million devices and makes its creators $300,000 a monthwww.zdnet.com7/5/2016
Satana ransomware encrypts user files and master boot recordwww.computerworld.com7/1/2016
Android Malware Targets Europe via Smishing Campaignswww.securityweek.com6/28/2016
Ransomware attack almost sends NASCAR team to the garagewww.scmagazine.com6/24/2016
Ransomware now locks your smart TV - and then demands Apple iTunes giftswww.zdnet.com6/14/2016
Latest Intelligence for May
CryptXXX Ransomware Jumps From Angler to Neutrino Exploit Kitthreatpost.com6/9/2016
Increased Risks from Macro-Based
University gives in to $20,000 ransomware demandwww.zdnet.com6/8/2016
Skype being used to distribute malwarewww.scmagazine.com6/8/2016
Fake gaming torrents lead to potentially unwanted
IRONGATE ICS Malware: Nothing to see here...Masking malicious activity on #scada systemswww.fireeye.com6/2/2016
Serpent-like malware targets your bank accountwww.cnbc.com5/27/2016
Amazon Users Targets of Massive Locky Spear-Phishing Campaignthreatpost.com5/26/2016
Hypervisor Introspection: Fighting APTs in Business Environment – Part 1businessinsights.bitdefender.com5/24/2016
Password reuse bot steals creds from weak sites, logs in to
A recently patched Flash Player exploit is being used in widespread attackswww.computerworld.com5/23/2016
Targeted Attacks against Banks in the Middle Eastwww.fireeye.com5/22/2016
Macro Malware Makes Improvements on Hiding Malicious Codewww.securityweek.com5/18/2016
Vietnam's Tien Phong Bank says it was second bank hit by SWIFT cyberattackwww.cnbc.com5/15/2016
Current Campaign Delivers Hundreds of Thousands of Polymorphic Ransomwareblogs.mcafee.com5/9/2016
Malware may abuse Android’s accessibility service to bypass security
FBI Warns of a Rise in Ransomware Attackswww.tripwire.com5/3/2016
Decryption Tool Released for CryptXXX Ransomwarewww.tripwire.com4/27/2016
GozNym banking Trojan ramps up attacks, targets Europewww.zdnet.com4/26/2016
Bangladesh Bank attackers used custom malware that hijacked SWIFT softwarewww.networkworld.com4/25/2016
Generic Ransomware Detection Comes to OS Xthreatpost.com4/20/2016
'Multigrain' variant of POS malware crops up; uses DNS tunneling to steal datawww.scmagazine.com4/20/2016
Schools put on high alert for JBoss ransomware exploitwww.computerworld.com4/15/2016
Mutating Qbot Worm Infects Over 54,000 PCs at Organizations Worldwidewww.tripwire.com4/14/2016
Meet The Cryptoworm, The Future of Ransomwarethreatpost.com4/12/2016
Jigsaw ransomware deletes more files the longer you delay payingwww.computerworld.com4/12/2016
Click-Fraud Ramdo Malware Family Continues to Plague Usersresearchcenter.paloaltonetworks.com4/11/2016
Ransomware: Locky, TeslaCrypt, Other Malware Families Use New Tool To Evade Detectionresearchcenter.paloaltonetworks.com4/8/2016
US, Canada Issue Ransomware Advisorythreatpost.com4/4/2016
New Ransomware KimcilWare Targets Magento Websitesthreatpost.com4/1/2016
Ransomware Forces Hospitals to Shut Down Network, Resort to Paperwww.tripwire.com3/29/2016
TREASUREHUNT: A Custom POS Malware Toolwww.fireeye.com3/28/2016
Malware authors quickly adopt SHA-2 through stolen code-signing certificateswww.computerworld.com3/25/2016
PETYA Crypto-ransomware Overwrites MBR to Lock Users Out of Their Computersblog.trendmicro.com3/24/2016
Three more hospitals hit with ransomware attackswww.networkworld.com3/23/2016
W97M Downloader Serves Vawtrak Malwareblogs.mcafee.com3/22/2016
Uh-oh Lenovo. PC maker pushes out malicious Angler exploit kitwww.grahamcluley.com3/20/2016
Steam Stealer malware attacks on gamers' credentials gaining steamwww.scmagazine.com3/16/2016
AceDeceiver: First iOS Trojan Exploiting Apple DRM Design Flaws to Infect Any iOS Deviceresearchcenter.paloaltonetworks.com3/16/2016
PowerSniff Malware Used in Macro-based Attacksresearchcenter.paloaltonetworks.com3/11/2016
Android mobile banking trojan uses layered defenses to avoid removalwww.scmagazine.com3/10/2016
Locky ransomware activity ticks upwww.computerworld.com3/10/2016
Rosen Hotel chain was hit by credit-card stealing malware for 17 monthswww.tripwire.com3/9/2016
Fully Functional Ransomware Targeting OS X Userswww.tripwire.com3/7/2016
ATMZombie Trojan strikes Israeli bankswww.zdnet.com2/29/2016
FighterPOS PoS Malware Gets Worm Routineblog.trendmicro.com2/25/2016
Acecard Trojan: many-headed and extremely dangerousbusiness.kaspersky.com2/24/2016
Ransomware offers customer support via chatwww.helpnetsecurity.com2/19/2016
New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransomresearchcenter.paloaltonetworks.com2/18/2016
Nivdort: Data-Stealing Trojan Arrives via Spamblogs.mcafee.com2/18/2016
Locky: New Ransomware Mimics Dridex-Style Distributionresearchcenter.paloaltonetworks.com2/16/2016
Hackers are using malware and phishing scams to steal Netflix users' passwords, bank detailswww.zdnet.com2/15/2016
Microsoft: Windows 10, Edge so secure they don't need our EMET anti zero-day shieldwww.zdnet.com2/5/2016
Scareware Campaign Targets Mac OS X Machinesthreatpost.com2/5/2016
Fake Adobe Flash Update OS X Malwareisc.sans.edu2/4/2016
Dell will protect the boot layer of PCs, tabletswww.computerworld.com2/4/2016
Google lays bare security flaws in anti-malware product with 250 million userswww.zdnet.com2/3/2016
Massive Admedia/Adverting iFrame Infectionblog.sucuri.net2/1/2016
New Android ransomware uses clickjacking to gain admin privilegeswww.computerworld.com1/27/2016
Global mass injection affects thousands of websites
MSN Home Page Drops More Malware Via Malvertisingblog.malwarebytes.org1/19/2016
Norway cops, Europol, throw cage over
Updated BlackEnergy Trojan Grows More Powerfulblogs.mcafee.com1/14/2016
Android banking malware SlemBunk is part of well-organized campaignwww.computerworld.com1/14/2016
WhatsApp Phishing Email Campaign Spreading Nivdort Malware Variantwww.tripwire.com1/13/2016
Android-based Smart TVs Hit By Backdoor Spread Via Malicious Appblog.trendmicro.com1/7/2016
Konnichiwa, Rovnix! Aggressive Malware Hits Japanese Bankssecurityintelligence.com1/7/2016
New TeslaCrypt Ransomware Arrives via Spamblogs.mcafee.com1/5/2016
Kaspersky: Ransomware doubled last year, shifted focus to enterprisewww.networkworld.com1/5/2016
BlackEnergy drains files from Ukraine media, energy
New Android-infecting malware brew hijacks devices. Why, you ask? Your
SlemBunk: An Evolving Android Trojan Family Targeting Users of Worldwide Banking Appswww.fireeye.com12/17/2015
Attacks using TeslaCrypt ransomware intensifywww.networkworld.com12/15/2015
Cyberspy group resurrects 12-year-old Bifrose back doorwww.computerworld.com12/11/2015
Just in time for Xmas: Extra stealthy Point of Sale
DRIDEX Spam Runs Resurface Against US Targetsblog.trendmicro.com11/25/2015
Dell ships laptops pre-vulnerable to Man-in-the-middle attackswww.scmagazine.com11/24/2015
New Toolset Linked to Wiper Malware in Sony Hack, Finds Researcherswww.tripwire.com11/23/2015
Trojanized adware family abuses accessibility service to install whatever apps it wantsblog.lookout.com11/19/2015
TDrop2 Attacks Suggest Dark Seoul Attackers Returnresearchcenter.paloaltonetworks.com11/18/2015
Researchers Discover Two New Strains of POS Malwarethreatpost.com11/13/2015
Linux ransomware rising? Linux.Encoder.1 now infects thousands of websiteswww.zdnet.com11/13/2015
Cloudsota Trojan Found Preinstalled on Tens of Thousands of Tabletswww.tripwire.com11/13/2015
Now cybercriminals are using video ads to plant malwarewww.computerworld.com11/12/2015
First Linux ransomware program cracked, for nowwww.computerworld.com11/10/2015
New crypto-ransomware targets Linux web
Despite takedown, the Dridex botnet is running againwww.computerworld.com10/26/2015
Thousands of e-commerce Magento websites struck with Guruncsite malwarewww.zdnet.com10/19/2015
Hackers being hunted after stealing $30.7M via malwarewww.cnbc.com10/14/2015
Apple iPhone malware alert: YiSpecter hid in App Store for 10 months [u]www.computerworld.com10/5/2015
Internet of Things vigilante malware strikes tens of thousands of devices - to protect themwww.zdnet.com10/2/2015
Stagefright 2.0: New vulnerabilities leave a billion Android devices at
Dridex is Back and Targeting the UKresearchcenter.paloaltonetworks.com10/1/2015
WordPress Malware – Active VisitorTracker Campaignblog.sucuri.net9/18/2015
Attackers install highly persistent malware implants on Cisco routerswww.computerworld.com9/15/2015
Aggressive Android ransomware spreading in the USAwww.welivesecurity.com9/10/2015
Malware targeting Android on the rise: Reportwww.cnbc.com9/2/2015
Rocket Kitten APT threat persists after its outingwww.scmagazine.com9/1/2015
Shifu: ‘Masterful’ New Banking Trojan Is Attacking 14 Japanese Bankssecurityintelligence.com8/31/2015
KeyRaider Malware Steals Certificates, Keys and Account Data From Jailbroken iPhonesthreatpost.com8/31/2015
Updated Rig Exploit Kit Closing in on 1 Million Victimsthreatpost.com8/4/2015
Hackers Exploit ‘Flash’ Vulnerability in Yahoo Adsbits.blogs.nytimes.com8/3/2015
Malicious spam continues to serve zip archives of javascript filesisc.sans.edu7/29/2015
Analyzing a Facebook Clickbait Wormblog.sucuri.net6/30/2015
Dridex Malware Featured in New Spam Campaign Targeting Email Userswww.tripwire.com6/30/2015
MalwareBytes to turn counterfeit license keys into good ones for freewww.zdnet.com6/29/2015
Dyre emerges as main financial Trojan
Study: 15-30 percent of eCommerce site visitors infected with CSIMwww.scmagazine.com6/16/2015
Stegoloader: A Wolf in Sheep’s Clothingwww.secureworks.com6/15/2015
New APT Duqu 2.0 Hits High-Value Victims, Including Kaspersky Labthreatpost.com6/10/2015
‘Evoltin’ POS Malware Attacks via Macroblogs.mcafee.com6/10/2015
Undetectable NSA-linked hybrid malware hits Intel Security
Malware targets Oracle Micros point-of-sale customerswww.computerworld.com6/8/2015
KeyBase Keylogger Malware Family Exposedresearchcenter.paloaltonetworks.com6/4/2015
Adware-Laden Skype Botnet Disruptedthreatpost.com6/4/2015
Myfax malspam wave with links to malware and Neutrino exploit kitisc.sans.edu6/3/2015
DYRE Banking Malware Upsurges; Europe and North America Most Affectedblog.trendmicro.com6/2/2015
Detection changes: search protection codeblogs.technet.com5/26/2015
Meet ‘Tox': Ransomware for the Rest of Usblogs.mcafee.com5/23/2015
Penn State cyberattack said to have originated from Chinawww.zdnet.com5/18/2015
Malware Spreads Through Facebook Tag Scamblogs.mcafee.com5/18/2015
Check your sources! Trojanized open source SSH software used to steal
Angler exploit kit pushes new variant of ransomwareisc.sans.edu5/12/2015
New 'Rombertik' malware destroys master boot record if analysis function detectedwww.scmagazine.com5/5/2015
Servers seized in global Simda botnet hitwww.zdnet.com4/13/2015
APT 30 and the Mechanics of a Long-Running Cyber Espionage Operationwww.fireeye.com4/12/2015
KJWorm VBS Malware Tied To Attacks on French TV Station TV5Mondeblog.trendmicro.com4/11/2015
International effort takes down 'Beebone' botnetwww.scmagazine.com4/9/2015
CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Filesblog.trendmicro.com4/6/2015
SWF Files Injecting Malicious iFrames on WordPress, Joomla Sitesthreatpost.com4/3/2015
Dyre Wolf malware huffs and puffs at your corporate bank account doorwww.zdnet.com4/3/2015
The Dyre Wolf Campaign: Stealing Millions and Hungry for Moresecurityintelligence.com4/2/2015
Twitch botnet malware lets scammers fraudulently earn money through gaming
Ransomware holds New Jersey school district's network hostagewww.scmagazine.com3/25/2015
Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale
Freshly Patched Flash Exploit Added to Nuclear Exploit Kitblog.trendmicro.com3/20/2015
Bartallex Renews Strain of Macro Malwareblogs.mcafee.com3/18/2015
Teslacrypt Joins Ransomware Fieldblogs.mcafee.com3/17/2015
TeslaCrypt ransomware attacks gamers - "all your files are belong to us!"nakedsecurity.sophos.com3/16/2015
‘Podec’ Trojan Bypasses CAPTCHA on Android Phoneswww.tripwire.com3/11/2015
Mandarin Oriental eradicates malware from credit card systemswww.zdnet.com3/6/2015
Gazon - the Android virus that SMSes everyonenakedsecurity.sophos.com3/6/2015
Attackers concealing malicious macros in XML fileswww.trustwave.com3/6/2015
New POS Malware Uses Mailslots to Avoid Detection:threatpost.com3/3/2015
‘Gazon’ Malware Spreads Via SMS Using Fake Amazon Gift Card Offerswww.tripwire.com3/3/2015
Threat Spotlight: Angler Lurking in the Domain
Netwire RAT Behind Recent Targeted Attacksblogs.mcafee.com3/2/2015
PlugX APT group uses backdoor in India campaignwww.scmagazine.com2/27/2015
Researchers uncover signs of Superfish-style attackswww.computerworld.com2/26/2015
Beyond Stuxnet and Flame: Equation 'most advanced' cybercriminal gang recordedwww.zdnet.com2/16/2015
Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnetwww.wired.com2/16/2015
Banking Malware VAWTRAK Now Uses Malicious Macros, Abuses Windows PowerShellblog.trendmicro.com2/16/2015
Carbanak Ring Steals $1 Billion from Banksthreatpost.com2/15/2015
Biter bitten as hacker leaks source code for popular exploit
Mobile Malware Gang Steals Millions from South Korean Usersblog.trendmicro.com2/12/2015
PlugX, Go-To Malware for Targeted Attacks, More Prominent Than Everthreatpost.com2/10/2015
Android Malware Poses as Games on Google Play Store, Infects Millions of Userswww.tripwire.com2/4/2015
New 'f0xy' malware is intelligent - employs cunning stealth & trickerycommunity.websense.com1/29/2015
Winnti trojan may help set stage for Skeleton Key attacks, analysts saywww.scmagazine.com1/29/2015
Firm finds link between Regin spy tool and QWERTY keyloggerwww.scmagazine.com1/27/2015
Researchers Link Regin to Malware Disclosed in Recent Snowden Documentsthreatpost.com1/27/2015
Exploit for Flash Zero Day Appears in Angler Exploit Kitthreatpost.com1/21/2015
Mobile malware on the rise worldwide, ransomware hits the spotlightwww.zdnet.com1/20/2015
PlugX Malware Found in Official Releases of League of Legends, Path of Exileblog.trendmicro.com1/20/2015
Android malware encounters surged in 2014, up by 75 percent, report sayswww.scmagazine.com1/15/2015
Researcher builds $10 spy tool disguised as wall chargerwww.scmagazine.com1/14/2015
Attackers planting banking Trojans in industrial
TorrentLocker Ransomware Hits ANZ Regionblog.trendmicro.com1/11/2015
Thunderstrike - new Mac "ueberrootkit" could own your Apple forever?nakedsecurity.sophos.com1/9/2015
CryptoWall ransomware variant gets new defenseswww.computerworld.com1/9/2015
Malvertising campaign strikes news outlets through AOLwww.zdnet.com1/9/2015
Macro-based malware is making a comeback, researchers warnwww.computerworld.com1/7/2015
BlackEnergy Malware Caused Ukrainian Power Outage, Confirms Researcherswww.tripwire.com1/5/2015
SoakSoak Malware Campaign Evolvesthreatpost.com12/23/2014
Alert (TA14-353A) Targeted Destructive
ZeuS variant strikes 150 banks worldwidewww.zdnet.com12/19/2014
Upatre Downloader Spreading Dyreza Banking Trojanthreatpost.com12/12/2014
Microsoft antimalware to lock down system settingswww.zdnet.com12/12/2014
Two stealthy Linux malware samples uncovered, following in Windows variants' trackswww.zdnet.com12/9/2014
Evidence links malware to attack against Sony Pictureswww.computerworld.com12/4/2014
Details Emerge on Sony Wiper Malware Destover:threatpost.com12/4/2014
Pay with your credit card at station kiosk? 'Dare Devil' is targeting
Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographerwww.wired.com11/24/2014
'Most advanced mobile botnet EVER' is coming for your OFFICE
Cybercriminals Use Citadel to Compromise Password Management and Authentication Solutionssecurityintelligence.com11/19/2014
Masque Attack: All Your iOS Apps Belong to Uswww.fireeye.com11/10/2014
Apple addresses OS X, iOS WireLurker malware threat, C&C goes offlinewww.scmagazine.com11/6/2014
Horrible Apple iOS virus; vectored via USB: WireLurker is 'new brand of threat' [u]www.computerworld.com11/6/2014
Banking Trojan DRIDEX Uses Macros for Infectionblog.trendmicro.com11/5/2014
BlackEnergy cyberespionage group targets Linux and Ciscowww.computerworld.com11/4/2014
ROM – A New Version of the Backoff PoS Malwareblog.fortinet.com11/3/2014
Popular Science site shrugs off malicious code
Hackers Are Using Gmail Drafts to Update Their Malware and Steal Datawww.wired.com10/29/2014
The dangers of opening suspicious emails: Crowti ransomwareblogs.technet.com10/28/2014
Alert (TA14-300A) Phishing Campaign Linked with “Dyre” Banking
Backoff malware linked to data breaches is spreadingwww.computerworld.com10/24/2014
Adobe exploit used to spread Dyre credential stealerwww.scmagazine.com10/21/2014
FireEye and OS X Supportwww.fireeye.com10/7/2014
Yahoo confirms servers infected — but not by Shellshockwww.zdnet.com10/7/2014
Group infects more than 500K systems, targets banking credentials in U.S.www.scmagazine.com10/7/2014
FBI opens Malware Investigator portal to
Data breach that hit Jimmy John's is larger than first thoughtwww.computerworld.com9/26/2014
56 Million Payment Cards At Risk in Home Depot Data Breachthreatpost.com9/18/2014
Dyre Banking Trojan Used in APT-Style Attacks Against Enterprisessecurityintelligence.com9/15/2014
Hacked Brazilian Newspaper Site Targets Router DNS Settingsthreatpost.com9/12/2014 breached, injected with malwarenakedsecurity.sophos.com9/8/2014
Credential-Stealing Malware Targets Salesforce Userswww.tripwire.com9/8/2014
New variants of POS malware 'Backoff' found as infections expandwww.scmagazine.com8/25/2014
Reveton ransomware adds powerful password stealerwww.computerworld.com8/20/2014
Malware no longer avoids virtual machineswww.computerworld.com8/13/2014
Two new Gameover Zeus variants in the wildwww.scmagazine.com8/11/2014
Citadel Malware Variant Allows Attackers Remote Access, Even After Removalthreatpost.com8/1/2014
Backoff: New Point of Sale
How Hackers Hid a Money-Mining Botnet in Amazon’s Cloudwww.wired.com7/24/2014
Crooks fling banking Trojan at Japanese smut site
The Father of Zeus: Kronos Malware Discoveredsecurityintelligence.com7/11/2014
Police, security firms team up and take down Shylock malwarewww.zdnet.com7/11/2014
Possible New Version of Gameover Zeus Malware Emergesthreatpost.com7/11/2014
Travelers targeted by infected travel
Zeus PIF - The evolving strain looking to defeat your security softwarecommunity.websense.com7/7/2014
RSA: Brazil's 'Boleto Malware' stole nearly $4 billion in two yearswww.zdnet.com7/3/2014
Conficker: Still spamming after all these yearswww.zdnet.com7/3/2014
Latest Microsoft Malware Takedown Causes Waves in Security Communitythreatpost.com7/1/2014
Dropbox used as command and control for Taiwan time
Microsoft's crusade against malware advances to Kuwait, Algeriawww.computerworld.com6/30/2014
Android SMS worm punts dodgy downloads... from your
Luuuk Trojan snatches €500,000 from European bank in one weekwww.zdnet.com6/25/2014
New Havex malware variants target industrial control system, SCADA userswww.computerworld.com6/24/2014
Security holes could give hackers access to iOS, Android deviceswww.computerworld.com6/18/2014
Hacker Hijacks Storage Devices, Mines $620,000 in Dogecoinwww.wired.com6/17/2014
Versatility of Zeus Framework Encourages Criminal Innovationthreatpost.com6/12/2014
ZeuS.Maple Variant Targets Canadian Online Banking Customerssecurityintelligence.com6/9/2014
Phishing campaign touts fake 'Heartbleed removal' toolwww.computerworld.com6/3/2014
GameOver Zeus botnet seized; Two week window to protect yourself, say authoritieswww.zdnet.com6/2/2014
Global law enforcement operation targets hackers behind malwarewww.cnn.com5/16/2014
New iOS malware with a funky name: "Unflod Baby Panda"nakedsecurity.sophos.com4/21/2014
Versatility of Zeus Framework Encourages Criminal Innovationthreatpost.com4/12/2014
Facebook flashes its One Tool To Rule Them All in security threat
Microsoft touts study showing the cost of pirated softwarenews.cnet.com3/19/2014
How Target detected hack but failed to act -- Bloombergnews.cnet.com3/13/2014
Zeus variant targets accounts, SaaS applicationswww.zdnet.com2/20/2014
CoinThief Bitcoin Trojan Found on Popular Download Sitesthreatpost.com2/11/2014
Uncle Sam: I want you to sell me malwarewww.zdnet.com2/6/2014
DailyMotion Still Infected, Serving Fake AV Malwarethreatpost.com1/31/2014
Cross-Platform Java bot foundwww.zdnet.com1/29/2014
New Android Malware Steals SMS Messages, Intercepts Callsthreatpost.com1/22/2014
A Leader again! McAfee is positioned highest for completeness of vision in the new Gartner Endpoint Magic Quadrantblogs.mcafee.com1/16/2014
Security researcher finds clues to malware in Target heistnews.cnet.com1/15/2014
Google Blocks Malicious File Downloads Automatically in Chromethreatpost.com1/14/2014
More retailers hit by security breaches; malware found on Target's POS machineswww.zdnet.com1/13/2014
Yahoo says malware attack farther reaching than thoughtnews.cnet.com1/11/2014
Questions left unanswered about Yahoo malware attacknews.cnet.com1/5/2014
New Malware Attacks Target Syrian Activiststhreatpost.com12/24/2013
CryptoLocker Creators Infected Nearly 250,000 Systems, Earned $300k Since Septemberthreatpost.com12/20/2013
Bogus Firefox add-on FORCES WITLESS USERS to join vuln-hunting
Microsoft, Europol, FBI and industry partners disrupt notorious ZeroAccess botnet that hijacks search resultsblogs.technet.com12/5/2013
Next generation Stuxnet worm in the works, says Iran news agencywww.zdnet.com12/3/2013
Rogue US-Israeli cyberwar weapon 'infected Russian nuclear plant'
Google Chrome to Automatically Block Malicious Downloadswww.zdnet.com11/1/2013 resets passwords after malware flinging HACK
Report: UN Nuclear Regulator Infected with Malwarethreatpost.com10/23/2013
Moscow cops cuff suspect in Blackhole crimeware
Juniper study: 80% of smartphones still unprotected from malware, attackswww.zdnet.com10/9/2013
Android adware that MUST NOT BE NAMED threatens
Compromised Japanese Media Sites Serving Exploits for Latest IE Zero Daythreatpost.com9/23/2013
New OS X Trojan found and blocked by Apple's XProtectreviews.cnet.com9/22/2013
McAfee: And the most dangerous cyber celebrity
Shylock Financial Malware Back and Targeting Two Dozen Major Banksthreatpost.com9/18/2013
Chap unrolls 'USB condom' to protect against
Citadel botnet resurges to storm Japanese
Kelihos Relying on CBL Blacklists to Evaluate New Botsthreatpost.com8/28/2013
Mobile Threat Monday: Nasty Adware And A Master Key Mysterysecuritywatch.pcmag.com8/26/2013
Good News: Phishing Protection Actually Workssecuritywatch.pcmag.com8/20/2013
Buying your biz a buzz: Hackers sell fake Instagram 'likes'news.cnet.com8/17/2013
Counter.php Found Redirecting to Sites Peddling Styx Exploit Kitthreatpost.com8/12/2013
Dutch DNS server 'hack': Thousands of sites serve up malwarewww.zdnet.com8/9/2013
$1.5 million Cyberheist Ruins Escrow Firmkrebsonsecurity.com8/7/2013
Earn £8,000 a MONTH with bogus apps from Russian malware
Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviorsblogs.mcafee.com7/23/2013
New Mac malware disguised with right-to-left encoding trickreviews.cnet.com7/15/2013
Unusual file-infecting malware steals FTP credentialswww.computerworld.com7/15/2013
Google study finds users ignore Chrome security
Google adds (some) malware and phishing info to Transparency Reportnakedsecurity.sophos.com6/28/2013
Five simple ways to avoid Android malwarewww.zdnet.com6/28/2013
Feds target former high-ranking general in Stuxnet leak probenews.cnet.com6/27/2013
Most Android threats would be blocked if phones ran latest Android version, report sayswww.computerworld.com6/26/2013
Google: Hacked sites far worse than attack sitesnews.cnet.com6/25/2013
Mobile malware grows by 614 percent in last yearnews.cnet.com6/25/2013
Microsoft and FBI storm ramparts of Citadel
Locking Down Desktops With McAfee’s Application Controlblogs.mcafee.com6/6/2013
McAfee sees surge in spam, Koobface samples, MBR attackswww.computerworld.com6/3/2013
Android malware in pictures - a blow-by-blow account of mobile scarewarenakedsecurity.sophos.com5/31/2013
Blue Coat gobbles CCTV-for-network-traffic maker
Growing mobile malware threat swirls (mostly) around Androidwww.computerworld.com5/22/2013
Citadel’s New Target – Payza’s Payment Platformwww.trusteer.com5/21/2013
IE10 beats Chrome, Safari, Firefox at blocking web malwarewww.zdnet.com5/15/2013
German govt DUMPS 170 NEW PCs riddled with
Watering Hole Attack Claims US Department of Labor Websitethreatpost.com5/1/2013
Healthcare sector, SMBs top cybercrime targets in Singaporewww.zdnet.com4/21/2013
Magic mystery malware menaces many UK machines - new
AVG: That World of Warcraft hack? RIDDLED with
Gaming Company Certificates Stolen and Used to Attack Activists, Otherswww.wired.com4/11/2013
Advanced Persistent Threats get more advanced, persistent and
New study finds malware variants skirting AV, mostly delivered via webwww.scmagazine.com3/27/2013
South Korea data-wipe malware spread by patching
Experts finger disk-wiping badness used in S Korea
South Korean TV and banks paralysed in disk-wipe
Symantec finds Linux wiper malware used in S. Korean attackswww.computerworld.com3/20/2013
Credit report breach has link to Zeus banking malwarewww.computerworld.com3/18/2013
US national vulnerability database
Chinese search giant Baidu launches free English-language AV softwarewww.zdnet.com3/5/2013
Cyber-007 MiniDuke stalked Europe for at least 21
McAfee dumps signatures and proclaims an (almost) end to
Add Microsoft to list of hacked companiesnews.cnet.com2/22/2013
Exploit Sat on LA Times Website for 6 Weekskrebsonsecurity.com2/13/2013
Malnets to Continue Targeting Mobile Devices in 2013threatpost.com2/12/2013
McAfee updates business security management toolswww.computerworld.com2/12/2013
One-fifth of malicious mobile websites are porn-relatedwww.scmagazine.com2/11/2013
Banking malware returns to basics, researchers saywww.computerworld.com2/8/2013
Microsoft techies bust data centres, pull plug on Bamital
Researchers Discovery Data-Stealing Malware That Likes to Napthreatpost.com2/5/2013
Welcome to bullyware: Malware gets more aggressive in money huntwww.zdnet.com2/4/2013
Symantec: Don't blame us for New York Times
Kaspersky Lab adds mobile and system management to its business security offeringwww.computerworld.com1/30/2013
Three Charged with Creating, Distributing Gozi Banking Malwarethreatpost.com1/23/2013
Infected Site Spreading SMS Android Malwarethreatpost.com1/22/2013
Zaxby's Chicken Chain Warns of Possible Credit Card Theftsthreatpost.com1/15/2013
Malware Infects Two Power Plants Lacking Basic Security Controlsthreatpost.com1/14/2013
This photo slide scanner costs €60... The bundled malware? That's
Interview with Kaspersky Chief Malware Expert Alex Gostevthreatpost.com12/24/2012
Google to scan Chrome extensions, bans
Ransomware Extortion Scam Locks Machines, Demands Paymentthreatpost.com12/21/2012
New Apache Exploit Doling Out Zeus, Sweet Orange Exploit Kitthreatpost.com12/19/2012
Android botnet detected on all major mobile networkswww.scmagazine.com12/19/2012
Baby got .BAT: Old-school malware terrifies Iran with del *.*
Dexter malware targets point of sale systems
The 30-year-old prank that became the first computer
Latest Mac malware adds to 'troubling trend,' says security expertwww.zdnet.com12/14/2012
Mac OS X users targeted in SMS scamwww.scmagazine.com12/12/2012
‘Sanny’ Malware Targeting Russian Space, IT, Telecom Industriesthreatpost.com12/11/2012
10 security stories that shaped 2012www.zdnet.com12/10/2012
Low Detection Rates Mar Google Android Application Verification Servicethreatpost.com12/10/2012
Tor network used to command Skynet botnetwww.computerworld.com12/7/2012
Major £30m cyberheist pulled off using MOBILE
Necurs Rootkit Infections Way Upthreatpost.com12/7/2012
Rumble in the Tumblr: Troll-worm infected thousands of
Japan space agency: Virus may have stolen space rocket datawww.computerworld.com11/30/2012
Beware the malware-tipped SPEAR TRAP in your
Symantec Warns of New Malware Targeting SQL Databasesthreatpost.com11/23/2012
Anti-virus is no longer enough to stop the malwarewww.infosecurity-magazine.com11/14/2012
Looking for kernel changes among flocks of computers can help organizations detect rootkits, finds a team of researcherswww.darkreading.com11/9/2012
Cisco recommends McAfee switch for IronPort customers hit by Sophos flawswww.csoonline.com11/9/2012
Companies Need Defenses Against Mobile Malwarewww.darkreading.com11/8/2012
Cyberheists ‘A Helluva Wake-up Call’ to Small Bizkrebsonsecurity.com11/6/2012
Malware infects 13 percent of North American home networkswww.csoonline.com11/1/2012
Five Japanese detained for data theftwww.zdnet.com10/31/2012
Trend Micro's Q3 threat report: Mobile malware surged from 30K to 175Kwww.zdnet.com10/22/2012
Localized Dorkbot malware variant spreading across Skypewww.zdnet.com10/19/2012
McAfee debuts data center security suites for physical, cloud environmentswww.zdnet.com10/16/2012
Kaspersky Labs builds new OS to combat Stuxnet, major exploitswww.zdnet.com10/16/2012
Facebook's Anti-Virus Marketplace turns focus to URL blacklist systemwww.zdnet.com10/16/2012
Google building malware scanner for Google Play: reportwww.zdnet.com10/15/2012
Social Engineers Launch New Attack on Embattled Banksthreatpost.com10/5/2012
Chinese Hackers Blamed for Intrusion at Energy Industry Giant Telventkrebsonsecurity.com9/26/2012
Sophos update bug cripples businesses; customers affectedwww.zdnet.com9/21/2012
Flame C&C Server Analysis Reveals New Malware in the Wildthreatpost.com9/17/2012
Kaspersky: Shamoon malware nothing more than 'quick and dirty'www.zdnet.com9/14/2012
Tool Scans for RTF Files Spreading Malware in Targeted Attacksthreatpost.com9/14/2012
New Shamoon malware variant in the wildwww.zdnet.com9/5/2012
Qatari Gas Company Hit With Virus in Wave of Attacks on Energy Companieswww.wired.com8/30/2012
Cybercriminals impersonate popular security vendors, serve malwarewww.zdnet.com8/29/2012
Saudi Oil firm says 30,000 computers hit by virusnews.cnet.com8/27/2012
Crisis malware targets virtual machineswww.zdnet.com8/22/2012
SMSZombie wraps self in nudie pics, slips into 500,000 Android
New Targeted Attack Destroys Data At Middle East Energy Organizationwww.darkreading.com8/16/2012
Saudi oil giant seals off network after mystery malware
Meet Gauss: The latest cyber-espionage toolwww.zdnet.com8/9/2012
Attackers Go Phishing for Payroll Workers With Java CVE-2012-1723 Exploitthreatpost.com8/6/2012
Warning: Fake Groupon e-mails include malwarewww.zdnet.com8/2/2012
Metropolitan Police ransomware pretender ensnares 1,100
Mac Malware Spies On Email, Survives Rebootswww.informationweek.com7/30/2012
Twitter malware warning: It's you on photo? or It's about you?www.zdnet.com7/27/2012
New Mac malware spies on you via Adium, Firefox, Safari, Skypewww.zdnet.com7/26/2012
Hackers Linked to China’s Army Seen From EU to
Mahdi malware creators add new featuresnews.cnet.com7/25/2012
Japanese govt sucked dry for TWO YEARS by
Hackers pose as hacked software vendor to spread Zeus
Q2 2012: Flashback infects 10% of Macs, Android malware up 300%www.zdnet.com7/20/2012
New contacts stealing Android malware spotted in the wildwww.zdnet.com7/20/2012
Experts take down Grum spam botnet, world's third largestnews.cnet.com7/18/2012
Mahdi, the Messiah, Found Infecting Systems in Iran, Israelwww.wired.com7/17/2012
Phisher Faces Up To 50 Years For Role In $1.5 Million Scamwww.darkreading.com7/2/2012
Baltic cyber bank burglars cop hefty porridge
Which is the most popular antivirus software?www.zdnet.com6/27/2012
BlackHole exploit kit experimenting with 'pseudo-random domains' featurewww.zdnet.com6/27/2012
Russian Authorities Take Out World’s Largest Banking Botnetwww.infosecisland.com6/26/2012
Thousands of office printers hit by "gibberish" malwarewww.zdnet.com6/22/2012
A Closer Look: Email-Based Malware Attackskrebsonsecurity.com6/21/2012
Rare AutoCAD worm lifted blueprints from Peru, sent them to
Whitelisting is the solution for the national infrastructurewww.infosecurity-magazine.com6/21/2012
Six in Tokyo slammer after Android smut
Honeynet looks to trap USB
Alleged Lulzsec member, Ryan Cleary, indicted in U.S.www.computerworld.com6/14/2012
Flame gets suicide
Facebook warns users of the end of the Internet via DNSChangernews.cnet.com6/5/2012
A Massive Web of Fake Identities and Websites Controlled Flame Malwarewww.wired.com6/4/2012
Small banking Trojan poses major
Obama Order Sped Up Wave of Cyberattacks Against Iranwww.nytimes.com6/1/2012
House Committee to Probe e-Banking Heistskrebsonsecurity.com5/31/2012
White House Aims to Stoke Botnet Fightkrebsonsecurity.com5/29/2012
Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian Computerswww.wired.com5/28/2012
Bredolab Bot Herder Gets 4 Years for 30 Million Infectionswww.wired.com5/23/2012
Google warns DNSChanger victimswww.h-online.com5/23/2012
Banking malware spies on victims by hijacking webcams, microphones, researchers saywww.computerworld.com5/22/2012
Cross-browser worm spreads via Facebook, security experts warnwww.computerworld.com5/21/2012
Wikipedia: If you see ads on our site, you have malwarewww.zdnet.com5/15/2012
Amnesty websites compromised in Gh0st RAT
Jetting off abroad? Pack protection ... for your
Renewed efforts to revert DNSChanger in effectnews.cnet.com4/25/2012
Microsoft: Conficker Worm Continues to Plague Enterpriseswww.eweek.com4/25/2012
Iranian oil terminal 'offline' after 'malware attack'
Flashback botnet not shrinking, huge numbers of Macs still infectedwww.computerworld.com4/20/2012
Banking Trojan hijacks live chat to run real-time
New password-snatching Mac Trojan spreading in the
FCC chairman calls on ISPs to adopt new security measureswww.computerworld.com2/22/2012
New Waledac Variant Goes Roguewww.darkreading.com2/15/2012
Trojan appears that leverages patched Microsoft Office flawwww.scmagazine.com2/9/2012
Deadline looms to remove click-fraud malwarewww.scmagazine.com2/6/2012
Hungarian hacker gets 30 months for extortion plot on Marriottwww.computerworld.com2/3/2012
Virus Hits Part Of U.S. Commerce Dept.www.informationweek.com2/3/2012
Kelihos variants slipped Microsoft's
Trojan Targets Industry, Government With Fake Conference Invitationswww.eweek.com2/1/2012
Hackers Breached Railway Network, Disrupted Servicewww.wired.com1/24/2012
Malware attempts to steal money by duping the user into divulging an e-cash voucherwww.darkreading.com1/19/2012
Caution urged in City College of SF computer usewww.sfgate.com1/17/2012
Computer Virus Swipes Data from Japan's Space Agencywww.securitynewsdaily.com1/13/2012
Sykipot Malware Now Steals Smart-Card Credentialswww.darkreading.com1/12/2012
Air Force Drone Controllers Embrace Linux, But Why?www.informationweek.com1/12/2012
Stuxnet cyberweapon looks to be one on a production line, researchers saywww.csmonitor.com1/6/2012
Ramnit worm goes after Facebook credentialswww.computerworld.com1/5/2012
Former PM Brown was 'email hack victim'
Aggressive Phishing Attack Targets Military Personnelwww.informationweek.com12/28/2011
Koobface Gang Boosts Web Traffic, Profits from Pay-per-Click Scamswww.eweek.com12/23/2011
Zeus Criminals Launch DDoS Attacks to Hide Fraudulent Wire Transferswww.eweek.com12/1/2011
FBI Warns of Coordinated Malware and DDoS Attacks Designed to Drain Bank Accountswww.securityweek.com12/1/2011
Foreign hackers targeted Canadian
Duqu Attackers Wiped All Linux CandC Servers to Cover Trackswww.eweek.com11/30/2011
Evildoers can now turn all sites on a Linux server into silent
Phishers net Norwegian
Mystery malware poisons NZ ambulance
F-Secure finds rare digitally signed malwarenews.cnet.com11/14/2011
Tour de France winner sentenced for hack of doping
Operation Ghost Click: FBI bags crime ring responsible for $14 million in lossesisc.sans.edu11/9/2011
Duqu hackers shift to Belgium after India raidwww.reuters.com11/3/2011
FBI Helps Bust $4.6 Million Cybercrime Gangwww.informationweek.com11/2/2011
"DevilRobber" trojan targets Mac OS X for Bitcoinswww.scmagazineus.com10/31/2011
Son of Stuxnet Found in the Wild on Systems in Europewww.wired.com10/18/2011
Defense industry body target of
New Version Of Zeus Leverages Peer-To-Peer Technologywww.darkreading.com10/13/2011
Malware victim loses net connection to
Microsoft disrupts Kelihos botnet, names alleged mastermindwww.scmagazine.com9/27/2011 hacked to serve malwarewww.computerworld.com9/26/2011
Another OS X Trojan imitates Adobe Flash installerreviews.cnet.com9/26/2011
DigiNotar Files for Bankruptcy in Wake of Devastating Hackwww.wired.com9/20/2011
US credit card payment house (Heartland Payment Systems) breached by sniffing
White Papers
McAfee Labs Threats Report: December 2017www.mcafee.com12/17/2017
McAfee Labs Threats Report: September 2017securingtomorrow.mcafee.com9/25/2017
McAfee Labs Threats Report: June 2017securingtomorrow.mcafee.com6/19/2017
Latest Intelligence for March
McAfee Labs Threats Report: April 2017www.mcafee.com4/10/2017
Windows Management Instrumentation (WMI) Offense, Defense, and Forensicswww.fireeye.com10/7/2016
McAfee Labs Threats Report: September 2016www.mcafee.com9/14/2016
McAfee Labs Threats Report: August 2014 (2nd Quarter)www.mcafee.com8/31/2014
McAfee Labs Threats Report: June 2014 (1st Quarter)www.mcafee.com6/30/2014
McAfee Labs Threats Report Fourth Quarter 2013www.mcafee.com3/9/2014
Microsoft Security Intelligence Report (SIR) Volume 15: January 2013 to June
McAfee Threats Report: Second Quarter 2013www.mcafee.com8/21/2013
McAfee Threats Report: First Quarter 2013www.mcafee.com6/3/2013
Blue Coat Systems 2013 Mobile Malware Reportwww.bluecoat.com2/12/2013
Technology Security Assessment for Capabilities and Applicability in Energy Sector Industrial Control Systemswww.mcafee.com3/1/2012
Declaring War on Scarewarebusiness.ftc.gov12/1/2008
Malicious Software Control Policy
DISA STIG for Antivirus Security GuidanceDISA-STIG11/30/2015
NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and LaptopsNIST7/25/2013
NIST SP 800-167 Guide to Application WhitelistingNIST10/30/2015