Sections

Threat Research

Ad network scams

Avast Threat Labs finds Android device firmware that reroutes ad network revenue to unknown accounts.

24 October 2018 min read

MikroTik mayhem: Cryptomining campaign abusing routers

perex__ Computing power of computers, smartphones and smart TVs connected to vulnerable routers abused to mine cryptocurrency

Computing power of computers, smartphones and smart TVs connected to vulnerable routers abused to mine cryptocurrency

18 October 2018 min read

Block puzzles open the door to malware

perex__ Several block puzzle games in the Google Play Store now come with a side of malware.

Several block puzzle games in the Google Play Store now come with a side of malware.

9 October 2018 min read

Ransomware attacks via RDP choke SMBs

perex__ Protect yourself and your business from this troubling new trend.

Protect yourself and your business from this troubling new trend.

2 October 2018 min read

Torii botnet - Not another Mirai variant

perex__ {value=New, more sophisticated IoT botnet targets a wide range of devices }

New, more sophisticated IoT botnet targets a wide range of devices

27 September 2018 min read

Are smart homes vulnerable to hacking?

perex__ {value=Avast expert Martin Hron tells you what you need to know about the strengths and weaknesses of IoT security and the MQTT protocol that connects and controls them. , redirectUrl=https://app.hubspot.com/blog/486579/edit-beta/6069633257}

Avast expert Martin Hron tells you what you need to know about the strengths and weaknesses of IoT security and the MQTT protocol that connects and controls them.

16 August 2018 min read

Click
Confidently

Keeping the
world safe from
cyberattacks

Learn more

Fighting malware with machine learning

perex__ The evolution of Avast Evo-Gen: Using machine learning to protect hundreds of millions of users

The evolution of Avast Evo-Gen: Using machine learning to protect hundreds of millions of users

4 June 2018 min read

Spectre continues: Did we all trade speed for security?

perex__

Why patching especially matters in a post Meltdown and Spectre world.

24 May 2018 min read

Hacking iLO — take a moment to secure your servers

perex__ Ransomware attacks are as common as they are easy to produce. And we all must play a role in stopping them.

Ransomware attacks are as common as they are easy to produce. And we all must play a role in stopping them.

16 May 2018 min read

Botception with Necurs: Botnet distributes script with bot capabilities

perex__ VBScript allows threat actors to steal personal data and make victims vulnerable to keyloggers, banking malware and ransomware

VBScript allows threat actors to steal personal data and make victims vulnerable to keyloggers, banking malware and ransomware

4 May 2018 min read

Recent findings from CCleaner APT investigation reveal that attackers entered the Piriform network via TeamViewer

perex__ Unrelated to the CCleaner attack, Avast also found ShadowPad samples active in South Korea and Russia, logging a financial transaction

Unrelated to the CCleaner attack, Avast also found ShadowPad samples active in South Korea and Russia, logging a financial transaction

17 April 2018 min read

Minecraft players exposed to malicious code in modified “skins”

perex__ Close to 50,000 Minecraft accounts infected with malware designed to reformat hard-drives and more.

Close to 50,000 Minecraft accounts infected with malware designed to reformat hard-drives and more.

17 April 2018 min read