
Cloud and Threat Report: Global Cloud and Malware Trends
EXECUTIVE SUMMARY In this edition of the Cloud Threat Report, we examine the past twelve months of malware downloads from the cloud and web. Trojans accounted for the overwhelming majority

EXECUTIVE SUMMARY In this edition of the Cloud Threat Report, we examine the past twelve months of malware downloads from the cloud and web. Trojans accounted for the overwhelming majority

ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks The popularity of online shopping has been growing during the past few years, a trend accelerated by the

Jane Lo, Singapore Correspndent interviews Professor Dr. Christian Doerr, Professor of Cyber Security and Enterprise Security, Director of the Cyber Threat Intelligence Lab, Hasso Plattner Institute (Potsdam, Germany).

Interview with Mary Jo Schrade, Assistant General Counsel and Regional Lead for Microsoft’s Digital Crimes Unit (DCU) Asia.

Executive Summary In the third quarter of 2020, Recorded Future observed major expansions in the tactics, techniques, and procedures (TTPs) of prominent ransomware operators, including the targeting of educational institutions

Key Findings McAfee sees COVID-19-themed cyber-attack detections increase by 605% in Q2 2020 McAfee saw PowerShell malware surge 117% due to proliferation of malicious Donoff documents Attacks on cloud services

Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other open source intelligence (OSINT) sources to identify loaders and crypters that facilitate threat actor campaigns.

Trustwave SpiderLabs has discovered a new malware family, dubbed GoldenSpy, embedded in tax payment software that a Chinese bank requires corporations to install to conduct business operations in China. In

Cyber actors have increased the use of web shell malware for computer network exploitation. Web shell malware is software deployed by a hacker, usually on a victim’s web server. It

Mobile threats have been around nearly as long as the mobile phone, but they continue to increase in number and complexity as mobile devices become more embedded in, and critical