
How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
How we discovered a Ukranian cybercrime hotspot
Our researchers wanted to take a closer look at the GandCrab ransomware. Then they found an entire cybercrime network, operating from Ukraine.
Next-Generation Antivirus: How G DATA can protect customers from unknown threats
Antivirus programs no longer only work with malware signatures. Read about the next-generation technologies G DATA uses and how you can benefit from them.
Botnet: No jailtime for Mirai-creators
Their IoT-botnet created damage worth 100 Million US-Dollars. Yet, the developers will serve no jailtime - because they cooperated with the FBI.
Malware figures for the first half of 2018: The danger is on the web
More often than not, today's malware is distributed via the web – executable files are becoming less of a problem. Also, the G DATA security experts were able to identify a particular trend in the first half of the year that targets users' computers.
Wifi password cracking made easy
Security researchers have discovered a way to calculate a Wifi password with very little effort. Even though this is unnerving, there is no cause for widespread alarm: help is already on the way.
Foreshadow threatens confidential data in cloud environments
After Meltdown and Spectre, two research teams have discovered new security flaws in Intel's processors. The flaw affects all current Core iX as well as XEON CPUs. Learn more about the details of Foreshadow here.
Deeplocker: Interesting, but not yet a threat
AI malware presented at Blackhat security-conference is currently attracting a lot of attention. The clou: This new form of malware uses Artificial Intelligence to decide whether a certain computer will be attacked or not. Although the approach is interesting, G DATA-Experts see no imminent danger.
Support Scams fifth most common threat in July
Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.
G DATA analysis discovers Dosfuscation in the wild
The code of a malware downloader was so cleverly hidden that our analysts initially assumed it was a corrupted file. However, an in-depth analysis shows that this is a novel method for disguising batch and power shell commands.
Where we go, we don't need files: Analysis of fileless malware "Rozena"
Fileless malware leverages exploits to run malicious commands or launch scripts directly from memory using legitimate system tools such as Windows Powershell. Code Red and SQL Slammer were pioneers of fileless malware which date back to the early 2000s. Currently, this type of malware is on the rise…