Search results
26 sie 2024 · The most damaging types of malware can steal your most valuable data, including bank details, personal photos, and sensitive ID card information. Cybercriminals are relentless and will stop at nothing to exploit vulnerabilities in your computer or phone.
4 paź 2024 · Learn more about the latest viruses and malware, why scams and phishing attacks have emerged as persistent attack vectors, and how AI is changing the threat landscape.
Live Cyber Threat Map 10,191,216 attacks on this day Germany United States IN, United States VA, United States United Kingdom MO, United States Dominican Republic IA, United States United Kingdom
The report report identifies prime threats, major trends observed with respect to threats, threat actors and attack techniques, and also describes relevant mitigation measures. Top threats. ENISA sorted threats into 8 groups. Frequency and impact determine how prominent all of these threats still are. Ransomware:
25 sie 2022 · Key Findings. The top malware strains of 2021 are: Agent Tesla, AZORult, Formbook, Ursnif, LokiBot, MOUSEISLAND, NanoCore, Qakbot, Remcos, TrickBot and GootLoader. Malicious cyber actors have used Agent Tesla, AZORult, Formbook, LokiBot, NanoCore, Remcos, and TrickBot for at least five years.
MAP | Find out if you are under cyber-attack here
14 sie 2023 · In Q2, malware decreased by 40% compared to Q1 2023, and the Top 10 Malware decreased 65%. Furthermore, the Top 10 Malware variants comprised 39% of the total malware activity in Q2 2023, decreasing 28% compared to the previous quarter.