Follow Datanami:

Tag: malware

Amid COVID-19 Cybercrime Spike, ML Becomes Indispensable

Cybercriminals are exploiting the coronavirus pandemic to significantly expand their malicious activities against individuals and organizations. Amid the deluge of Trojans, ransomware, and phishing attacks, cybersecurity Read more…

Microsoft and Intel Test Malware Protection Through Computer Vision

The world of malware protection has come a long way since the wild west of the early 2000s, when Trojans lurked behind every download. The malware threats that loom now are more advanced – and more evasive. Now, resear Read more…

More Hadoop, YARN Threats Surface

New reports have emerged of expanding security threats targeting cloud-based Hadoop and YARN instances, including more sophisticated attacks described as “multi-vector/multi-platform threats.” Securonix, a securit Read more…

Latest Bot Targets Hadoop Clusters

Hadoop clusters are under siege by a recently discovered malware threat designed to take over cloud-based servers as a platform for launching distributed denial-of-service attacks. The malware dubbed DemonBot was repo Read more…

‘Dual-Use’ AI Poses New Security Threats

While the genie may already be out of the bottle, the rapid growth and broad availability of AI and machine learning technology along with a growing list of development tools is prompting critics to highlight future secu Read more…

A Deep Learning Approach for Detecting Unknown Malware

All of the major antivirus vendors at this point are moving towards machine learning approaches to keep up with the evolving threat landscape. That's the good news. However, with upwards of 1 million new pieces of malwar Read more…

Machine Learning ‘Arms Race’ Ahead, McAfee Warns

Machine learning is becoming an essential tool for helping cyber defenders detect vulnerabilities, spot suspicious behavior and contain exploits. At the same time, hackers are using machine learning to spot vulnerabiliti Read more…

Behavior Analytics Looks to Leapfrog SIEMs

So-called "credentials-based attacks" on corporate and government networks using, for example, stolen passwords or other authentication mechanisms, are among the fastest growing cyber threats. However, skeptics are quest Read more…

Datanami