article thumbnail

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021

Tenable

Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021. International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. While malware is used for a variety of purposes, the government agencies point out that ransomware is a primary use case. CVE-2017-0144.

Malware 74
article thumbnail

2017 in cybersecurity and privacy news

The Parallax

Ransomware, a particularly nasty form of malware that locks your computer until you pay off your attackers and has been around for decades, continued to wreak havoc in 2017. Margaret MacAlpine and Harri Hursti, voting machine researchers, appear with the AVS WinVote System at DefCon 25, July 30, 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

election commanded immense followings, according to research Jonathan Albright of Columbia University published in October 2017 : A group called “Blacktivists” had 103.7 Researcher Sara-Jayne Terp shows in her misinformation pyramid how attackers and defenders follow similar patterns to malware campaigns. million shares and 6.1

Malware 189
article thumbnail

Nearly 7K WordPress Sites Compromised by Balada Injector

Ooda Loop

Approximately 6,700 WordPress websites have been infected with the Balada injector malware, after using a Popup Builder plug-in with a cross-site vulnerability tracked as CVE-2023-6000. The Balada injector campaign has been running since 2017 and is an operation that has compromised over a million WordPress sites in the last six […]

Malware 109
article thumbnail

Are you ready for state-sponsored zombie malware attacks?

CTOvision

On January 4, 2017 CTO Vision published a blog post titled “Are you ready for a state-sponsored cyber attack?” In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess.

Malware 67
article thumbnail

IT firms, telcos among dozens hacked in new info-stealing malware attack

CTOvision

A cyber espionage group is deploying a new type of trojan malware against telecommunications, information technology, and government organisations.

Malware 73
article thumbnail

How TCS is helping to fight financial crime with AI and Microsoft Cloud

CIO

billion, a 436% increase over 2017 levels, according to McKinsey. Challenges for fraud risk management Fraud is a big and a worthwhile business for today’s online criminals, who troll the internet and insert data-stealing malware into vulnerable sites and mobile apps. The stakes for financial organizations are growing as well.

Cloud 227