Threat Research

Things we have learned about Petna, the Petya-based malware

Avast’s Jakub Kroustek answers open questions about Petna, the Petya-based malware that spread and infected computers around the world

30 June 2017 min read

Petya-based ransomware using EternalBlue to infect computers around the world


Petya-based ransomware is spreading and infecting computers around the world.

27 June 2017 min read

How AI outsmarts cybercriminals


Far from sci-fi depictions, artificial intelligence – through machine learning algorithms and big data – is key to defusing today's evolving cyberthreats.

15 June 2017 min read

Fighting the new wave of cybercrime


Defeating today’s – and tomorrow's – cybercriminals requires man and machine to collaborate, intelligently. This is the heart of next-gen cybersecurity.

8 June 2017 min read

WannaCry update: The worst ransomware outbreak in history

perex__ {}

Avast update on WannaCry: who was affected, who was targeted, how to remove it, and more.

16 May 2017 min read

WannaCry ransomware that infected Telefonica and NHS hospitals is spreading aggressively, with over 50,000 attacks so far today

perex__ {}

Avast protects you from WannaCry ransomware that infected NHS and Telefonica.

12 May 2017 min read


Learn more

New ATM fraud makes robbing a bank easier


Innovative and infamous bank fraud groups create new security challenges for banks.

23 March 2017 min read

IoT weaknesses put webcams at risk for attack [infographic]


Cybercrooks could easily watch people in private and public spaces via webcams, stream the video directly to the internet, or turn the device into a bot.

27 February 2017 min read

Misconfigured server reveals Cerber ransomware targets users in Europe, North America


Highly effective Cerber ransomware is spread via phishing emails and demands more than $700 in ransom  

13 January 2017 min read

A new Locky ransomware attack is coming


Based on analysis of past Locky ransomware attacks, experts in the Avast Threat Labs predict that another attack is imminent.

6 January 2017 min read

How malware and vulnerabilities get their names


You may have wondered where Cryptolocker or Heartbleed came from, and why. And does every virus and vulnerability get a name?

25 November 2016 min read

An in-depth look at the technology behind CyberCapture


Avast CTO and executive vice president Ondrej Vlcek explains CyberCapture's advanced malware detection methods used in every Avast product.

17 November 2016 min read
Load more articles (12)