Malware is becoming increasingly difficult for security software to spot

Representational image depecting cybersecurity protection
(Image credit: Shutterstock)

Malware is becoming increasingly difficult for security software to spot, as new variants come with increasingly sophisticated evasion capabilities. This is according to a report from WatchGuard Technologies, which claims that the number of evasive malware detections has risen to record levels.

The paper states that almost four in five (78%) of all malware delivered via encrypted connections is evasive. Overall, more than two-thirds (67%) of malware detections came over encrypted connections and, among this group, 78% were evasive zero-day threats capable of bypassing basic protections.

An unfortunate pattern is beginning to emerge, as the quantity of evasive malware has been steadily growing from quarter to quarter. WatchGuard Technologies says threats such as these can often be stopped at the perimeter with the help of firewalls that decrypt and scan incoming traffic. 

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Attacking the same old flaws

Unfortunately, the report further states, many organizations are failing to put sufficient protections in place.

And worse, the total number of detected network attacks is on the rise. An analysis of the past three years shows that Q1 2022 saw the most detections, with a 39% increase quarter-on-quarter.

One of the reasons, the researchers claim, is the fact that many threat actors try to abuse known vulnerabilities. Another is the growth of business networks, which means more vulnerable endpoints.

Advanced threats rose by a third (33%) suggesting a higher level of zero-day threats than ever before.

For Corey Nachreiner, CSO at WatchGuard, remote working is causing businesses a lot of trouble, and the only way to solve the security conundrum is to adopt a unified security approach.

“With the highest level of zero-day threats we’ve ever recorded and an attack surface that extends well beyond the network perimeter to IoT, home networks and mobile devices, companies need to adopt a true unified security approach that can adapt quickly and efficiently to the growing threat landscape,” he said.

“Organizations should make a commitment to implementing simple but critically important measures like updating and patching systems on a regular basis so they’re not enabling hackers.”

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Android phone malware
Over 25 new malware variants created every single hour as smart device cyberattacks more than double in 2024
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Sounding the alarm on AI-powered cybersecurity threats in 2025
email
A Windows filetype update may have complicated cyber threat detection efforts
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
ransomware avast
AI is helping hackers get access to systems quicker than ever before
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
DeepSeek
Deepseek’s new AI is smarter, faster, cheaper, and a real rival to OpenAI's models
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring