Skip links

Search Results for: malware

Fighting Against Malware

Fighting Against Malware (Malware Statistics for 2023)

Fighting Against Malware Malware attacks are a serious threat to businesses. A single attack can cost an organization $5 per minute, and more than 450,000 new pieces of malware are detected every day. In this video, Xcitium’s CISO Dr Erdal Ozkaya and IT Manager Valentine Sirghie share the latest malware statistics. They also explain how […]


Malware trends – Part 2 ( Free Guide)

Malware trends Threat actors are becoming more and more sophisticated, often making it nearly impossible for enterprises to defend against them or for end customers to identify visual indicators of compromise that could prevent the next cyber attack. Even though malware and its families are not new, there is no shortage of new payload and […]


The Malware Plague – Part 1

The Malware Plague Malicious software—commonly referred to as malware—is used by threat actors to perform malicious activities on a host system. These malicious activities include compromising the corporate network, identity theft, and data exfiltration. The evolution of connected devices and the fact that it has become practically impossible to run an enterprise without a computer […]


10 years of virtual dynamite: A high-level retrospective of ATM malware

10 years of virtual dynamite: A high-level retrospective of ATM malware POSTED BY VANJA SVAJCE via Talos Intelligence Executive summary It has been 10 years since the discovery of Skimer, first malware specifically designed to attack automated teller machines (ATMs). At the time, the learning curve for understanding its functionality was rather steep and analysis required […]

CyberSecurity Erdal

Malware past present and future.

Malware past present and future. This article is about Malwares, from the past , to present and their future, I hope you will like it… Introduction: Before we get into the specifics of how to malware history, present and past I believe we need to define some terminology, cover common types of malware, and introduce […]

This website uses cookies to improve your web experience.