Monday, May 2, 2022

New malware variants on the rise! 📈

Monthly Bulletin View online
Main Image
Malware. We all fear it, we all hate it, and we all try to fight it.
It can steal, encrypt, or delete information, alter or hijack core computer functions, and spy on our computer activity without our knowledge or permission. As this nasty type of threat continues to evolve and spread itself across machines and mobile devices, the need for security education, awareness, and proactivity is more acute now than ever. Not to mention the daily challenges that new and more sophisticated variants like Denonia, ZingoStealer, and FFDroider pose to security experts.
Make sure you didn't miss any of the latest news in terms of malware, and check our new edition of Heimdal's threat hunting journal on April's most detected malware. We have also prepared gripping interviews and brand-new YouTube videos addressing the most dangerous cyber threats.
Enjoy!
calendar icon
Cybersecurity Month in Review
calendar icon
News
Product Image
VLC Media Player Leveraged to Distribute Malware Loader
A lasting malicious campaign employed by hackers linked to the Chinese government has been recently discovered by security experts.
CBorat RAT Emerges on the Cyberthreat Landscape
Borat malware focuses on DDoS (Distributed-Denial-of-Service) cyberattacks, ransomware distribution,
and UAC bypass.
Product Image
Product Image
Fodcha DDoS Malware Targets More than 100 Victims Daily
A rapidly expanding malware is entrapping routers, DVRs, and servers all over the web to launch Distributed DDoS attacks on over 100 victims daily.
Industrial Spy Market
Advertised via Adware
The recently launched marketplace Industrial Spy sells info stolen from compromised organizations while also "spoiling" its customers with stolen data that's free of charge.
Product Image
calendar icon
CYBERSECURITY BASICS
Best Virtual Desktop Solutions You Need in 2022
Desktop virtualization refers to a software solution that isolates the desktop environment and any related application software from the client device used to access the desktop environment.
XDR vs EDR – A Comparison
Employees rely on mobile devices, home PCs, and laptops to access corporate networks for work, and XDR and EDR are two extremely effective protection approaches. But which one should you go for?
calendar icon
MAJOR EVENTS IN APRIL
New YouTube Video on Our Channel: Ransomware Explained
Product Image
This video will explain how ransomware happens, what types of ransomware attacks threaten businesses, what gangs are the most powerful, and how to stay safe.
How Cybersecurity Businesses Are Tackling the Ukraine War: CyberNews Exclusive Interview
Morten Kjærsgaard sat down with CyberNews, a leading research-based online publication that educates and protects consumers around the world from complex security risks to discuss what the war in Ukraine will bring to the cybersecurity industry.
View on Cybersecurity Industry through the Russia vs. Ukraine Conflict
Find out what is the main purpose of cyberwarfare and the cybersecurity industry in the Russia vs Ukraine war.
calendar icon
Top Malware(s) Detection:
1st of April – 30th of April
The early spring edition of Can you guess who's the winner of this year's (malware) egg hunt? If your answer was "trojan" then you're right – 20 trojan strains for the April 1st – 30th interval, totaling over 25,000 positive detections – a 24.24% decrease compared to March. Check out April edition of Heimdal™'s threat hunting journal.
Tell us more about yourself and help us provide you with quality content that best fits your needs and interests.
Keep up with all things Heimdal™ by following us on:
Security award image
Security award image
Security award image
Security award image
Security award image






This email was sent to edwardlorilla2117.tower@blogger.com
why did I get this?    unsubscribe from this list    update subscription preferences
Heimdal Security · VESTER FARIMAGSGADE 1 3 SAL, 1606 KØBENHAVN V · Copenhagen DK-1606 · Denmark

No comments:

Post a Comment