Security News > 2020 > December > WatchGuard Q3 cybersecurity report finds spike in network attacks and malware delivered over TLS

Report finds that over half the malware attacks in Q3 could bypass signature-based malware protection.
WatchGuard's latest Internet Security Report finds that cybercriminals shifted their focus to network attacks and sending malware over encrypted channels during the third quarter.
Security researchers noted that over half the malware they saw in Q3 could bypass basic signature-based malware protection, even if security teams scan encrypted traffic.
The latest WatchGuard report also reviewed overall malware trends and conducted DNS analysis to spot malicious activity.
Evasive and zero-day malware continue to be a threat as many zero-day malware samples change frequently while others morph on every copy, which makes signature-based anti-malware less effective, as the report notes.
News URL
Related news
- Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader (source)
- New Android malware steals your credit cards for NFC relay attacks (source)
- Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery (source)
- SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks (source)
- SK Telecom warns customer USIM data exposed in malware attack (source)
- DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks (source)
- Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedIn (source)
- Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool (source)
- Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks (source)
- MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks (source)