Security News > 2018 > April > AV-TEST reveals the best post-malware attack security tools

2018-04-17 02:58
Rebuilding operating systems has been the only true way to trust malware-infected computers. Security engineers at AV-TEST say there are other options.
News URL
Related news
- New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner (source)
- GitHub expands security tools after 39 million secrets leaked in 2024 (source)
- Open-source malware doubles, data exfiltration attacks dominate (source)
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware (source)
- What native cloud security tools won’t catch (source)
- Fake Microsoft Office add-in tools push malware via SourceForge (source)
- Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader (source)
- Interlock ransomware gang pushes fake IT tools in ClickFix attacks (source)
- New Android malware steals your credit cards for NFC relay attacks (source)
- Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery (source)