Malware
Latest about Malware
![Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)](https://cdn.mos.cms.futurecdn.net/4dB7zyRNSR7f8BCMoB3JqQ-320-80.jpg)
Over 10,000 WordPress sites found showing fake Google browser update pages to spread malware
By Sead Fadilpašić published
The affectedsites were running an older WordPress version and outdated plugins.
![A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.](https://cdn.mos.cms.futurecdn.net/NGKiUcJVFBC8HkMp9dTo9a-320-80.jpg)
Juniper VPN gateways targeted by stealthy "magic" malware
By Sead Fadilpašić published
J-Magic malware campaign was active for roughly a year, targeting endpoints at the edge.
![A padlock resting on a keyboard.](https://cdn.mos.cms.futurecdn.net/yDpezKpJsKYY4a3r9EzAw5-320-80.jpg)
Best firewall software of 2025
By Benedict Collins last updated
Updated Explore the best firewall software, to help defend your computer or IT systems against unauthorized intrusions.
![AMD Ryzen 5 7600X processor](https://cdn.mos.cms.futurecdn.net/e3jGwweDQdfFbswmYmjC8j-320-80.jpg)
AMD confirms processor security flaws after Asus patch slips out early
By Sead Fadilpašić published
Asus removed mentions of AMD, while the chipmaker confirmed the news.
![Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol](https://cdn.mos.cms.futurecdn.net/TWkP7ZurZMY6uepDxsK6Ha-320-80.jpg)
China-linked cyberespionage group PlushDaemon used South Korean VPN service to inject malware
By Chiara Castro published
ESET's new report shed light on PlushDaemon's malicious activities. Here's what we know so far.
![A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.](https://cdn.mos.cms.futurecdn.net/8wom7TXsEex7ExUd8LhF2n-320-80.jpg)
New UEFI Secure Boot flaw exposes systems to bootkits
By Sead Fadilpašić published
Crooks can abuse the bug to deploy malware at boot, ESET warns.
![A computer being guarded by cybersecurity.](https://cdn.mos.cms.futurecdn.net/uTLwBhC26YCauAq8Swffd8-320-80.jpg)
The impact of the cyber insurance industry in resilience against ransomware
By James Watts published
More organizations than ever have cyber insurance but fewer are making claims.
![Trojan](https://cdn.mos.cms.futurecdn.net/eVgzzXmQMEyvzfYvAaAMrX-320-80.jpg)
Hackers hide malware into website images to go unnoticed
By Sead Fadilpašić published
Multiple groups are using the same infection chain to deliver different infostealers, including 0bj3ctivityStealer and VIP Keylogger.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.