Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday Network of sites
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Once legit site found to be cryptomining, 6,000 machines infected
Check Point researchers discovered a previously legitimate video software download site has moved into cryptomining, earning around US$700 a day.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested."
Gen V cyber attacks are here, but most firms are 10 years behind, says Check Point
Security vendor Check Point believes that the age of Gen V cyber threats is now upon us, but organisations’ security defences are 10 years behind.
Necurs botnet erupts from dormancy to churn out 100,000 spam emails over Easter
One of the world’s largest spam botnets is back in action and this time it is spreading a Trojan downloader that can deliver nasty malware surprises.
GandCrab: The 'agile' ransomware that is updated in real time
The GandCrab ransomware has been making headlines recently for being one of the few malware strains that developers update in real time.
Five million Android devices possibly infected with 'aggressive' pre-installed adware
They claim Honor, Huawei and Xiaomi devices are most affected by the ‘extremely aggressive ad network’.
Not a Bitcoin owner? You're still fair game for a cryptomining attack
Check Point has released a 'cryptomining 101' document that details how cybercriminals hack into devices to steal their CPU power for illicit mining.
Cryptomining malware affected 42% organisations worldwide in Feb
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Check Point expands portfolio to continue fight against Gen V cyber attacks
Check Point has been busy crafting a number of security solutions for its global market in recent months.
Check Point releases January’s ‘most wanted’ malware
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Crypto-miners creating havoc for businesses: Coinhive 'Most Wanted' malware
Crypto-mining malware variants are causing headaches for enterprises and their computers as website owners try to recoup revenue, says Check Point.
Cisco maintains grip on IT security market after ‘strong channel partner focus’
Canalys has released its latest predictions surrounding the global IT security market’s performance over the third quarter in 2017.
Round 2: New line-up of cybersecurity maestros comment on Uber breach
We covered an expert commentary story of the Uber breach - this is round 2 with Check Point, Barracuda, Digital Shadows, Mimecast, and Webroot.
Check Point & LG plug security vulnerabilities in smart appliances
Check Point researchers recently worked with LG to plug vulnerabilities in a number of home appliances, including robot vacuum cleaners & dishwashers.
Reaper IoT botnet small but still dangerous, security experts warn
The Reaper IoT botnet is spreading fast, but it's still growing according to researchers at Qihoo and Arbor Networks.
Check Point uncovers major security flaw in LG smart devices
The vulnerabilities in the SmartThinQ mobile app and cloud application enabled hackers to gain control of home appliances and spy on users.
the IoTroop botnet: Could it be the next 'cyber hurricane'?
The rapid evolution of ‘IoTroop’ is happening much faster than the Mirai botnet; and it is enslaving IoT devices at a faster rate too.
Locky ransomware is back as one of September's 'most wanted' malware
“We’ve got ransomware taking up two of the top three spots – one a relatively new variant that just emerged this year, and the other an older family."
ExpensiveWall signs users up to fraudulent SMS services
Some Android users may notice fraudulent charges on their accounts if they have been infected by a new strain of malware dubbed “ExpensiveWall”.
6 months under siege: the malware story so far in 2017
Maya Horowitz, Threat Intelligence Group Manager at Check Point explores the major trends in global malware attacks during the first half of 2017.
Windows 10 security solutions powerless against 'bashware'
Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
Check Point, RMIT & MTA set challenge for cybersecurity students
“This Cyber Security Challenge will see Melbourne students share and develop ideas with Tel Aviv’ s next generation of cyber innovators."
Inside the Check Point & IBM collaboration: What's in store for the future of cyber defence
"We’re taking the next step in collaboration and are thrilled to have Check Point as a security partner to join and support this new ecosystem."
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
What does sustainable compliance look like?
Getting an organisation compliant is one thing, keeping it that way is another.
Survey: App dev is surging, but how are businesses doing it?
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal