malware infection

Linux-crypto-malware

Stealthy Linux Crypto-Mining Malware Takes Over Control

A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware.  Types Of Malware And How To Preven...

Malware Cyber Security Awareness: Managed Threat Protection

The Types Of Malware: How To Prevent & Protect Against Them

Malware Cyber Security Awareness: Managed Threat Protection Malware is a broad term for any type of malicious software designed to damage or exploit a device, service or network.  Cyber criminals...

Screen Shot 2021-09-21 at 11.04.27 AM

A Guide to the Various Types of Malware

Malware typically refers to malicious software comprised of worms, viruses, Trojans, and several other harmful programs. Hackers and spammers use Malware to damage your data and gain access to your confidential...

EXCEL

Excel Remains a Security Issue after 30 Years because of this One Feature

Microsoft released Excel 4.0 for Windows 3.0 and 3.1 in 1992 and many companies still use this functionality in legacy operations. The issue is that bad actors have started using Excel sheets and macros as a ne...

This Windows and Linux malware does everything it can to stay on your network

Microsoft has continued its analysis of the LemonDuck coin-mining malware which has been crafted by some very determined, financially motivated cybercriminals. LemonDuck is known for install...

Screen Shot 2021-08-02 at 10.45.57 AM

‘Praying Mantis’ threat actor targeting Windows internet-facing servers with malware

Windows internet-facing servers are being targeted by a new threat actor found by the Sygnia Incident Response team. The advanced and persistent threat which they call the ‘Praying Mantis’ is operating almost c...