New Zealand's leading source of cybersecurity and threat news
These search results are from across the Techday Network of sites
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Once legit site found to be cryptomining, 6,000 machines infected
Check Point researchers discovered a previously legitimate video software download site has moved into cryptomining, earning around US$700 a day.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested."
Gen V cyber attacks are here, but most firms are 10 years behind, says Check Point
Security vendor Check Point believes that the age of Gen V cyber threats is now upon us, but organisations’ security defences are 10 years behind.
Necurs botnet erupts from dormancy to churn out 100,000 spam emails over Easter
One of the world’s largest spam botnets is back in action and this time it is spreading a Trojan downloader that can deliver nasty malware surprises.
GandCrab: The 'agile' ransomware that is updated in real time
The GandCrab ransomware has been making headlines recently for being one of the few malware strains that developers update in real time.
Five million Android devices possibly infected with 'aggressive' pre-installed adware
They claim Honor, Huawei and Xiaomi devices are most affected by the ‘extremely aggressive ad network’.
Not a Bitcoin owner? You're still fair game for a cryptomining attack
Check Point has released a 'cryptomining 101' document that details how cybercriminals hack into devices to steal their CPU power for illicit mining.
Cryptomining malware affected 42% organisations worldwide in Feb
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Check Point expands portfolio to continue fight against Gen V cyber attacks
Check Point has been busy crafting a number of security solutions for its global market in recent months.
Check Point releases January’s ‘most wanted’ malware
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Crypto-miners creating havoc for businesses: Coinhive 'Most Wanted' malware
Crypto-mining malware variants are causing headaches for enterprises and their computers as website owners try to recoup revenue, says Check Point.
Cisco maintains grip on IT security market after ‘strong channel partner focus’
Canalys has released its latest predictions surrounding the global IT security market’s performance over the third quarter in 2017.
Round 2: New line-up of cybersecurity maestros comment on Uber breach
We covered an expert commentary story of the Uber breach - this is round 2 with Check Point, Barracuda, Digital Shadows, Mimecast, and Webroot.
Check Point & LG plug security vulnerabilities in smart appliances
Check Point researchers recently worked with LG to plug vulnerabilities in a number of home appliances, including robot vacuum cleaners & dishwashers.
Reaper IoT botnet small but still dangerous, security experts warn
The Reaper IoT botnet is spreading fast, but it's still growing according to researchers at Qihoo and Arbor Networks.
Check Point uncovers major security flaw in LG smart devices
The vulnerabilities in the SmartThinQ mobile app and cloud application enabled hackers to gain control of home appliances and spy on users.
the IoTroop botnet: Could it be the next 'cyber hurricane'?
The rapid evolution of ‘IoTroop’ is happening much faster than the Mirai botnet; and it is enslaving IoT devices at a faster rate too.
Locky ransomware is back as one of September's 'most wanted' malware
“We’ve got ransomware taking up two of the top three spots – one a relatively new variant that just emerged this year, and the other an older family."
ExpensiveWall signs users up to fraudulent SMS services
Some Android users may notice fraudulent charges on their accounts if they have been infected by a new strain of malware dubbed “ExpensiveWall”.
6 months under siege: the malware story so far in 2017
Maya Horowitz, Threat Intelligence Group Manager at Check Point explores the major trends in global malware attacks during the first half of 2017.
Windows 10 security solutions powerless against 'bashware'
Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
Check Point, RMIT & MTA set challenge for cybersecurity students
“This Cyber Security Challenge will see Melbourne students share and develop ideas with Tel Aviv’ s next generation of cyber innovators."
Inside the Check Point & IBM collaboration: What's in store for the future of cyber defence
"We’re taking the next step in collaboration and are thrilled to have Check Point as a security partner to join and support this new ecosystem."
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
A step-by-step guide to starting the security discussion with your executives
Your organisation has “jewels” in your servers and critical endpoints: Data.
E-book: The quick MSP guide to Security-as-a-Service
You may have a great security offering in you -aaS portfolio, but how do you know if it's the right one? And what could it cost you if it isn't?
The features that should be front and centre when evaluating SIEMs
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.