
Mitigate zero-day threats with the AMTSO Real-time Threat List
Malware threats are born, and they may fade, but the most effective – and...
In our latest update, Avira’s Vulnerability Detection Team takes a look at some of the most critical vulnerabilities of late 2020. No vulnerability report for 2020 would be complete without touching on what some describe as ‘the largest and most sophisticated attack the world has ever seen.’ But we will also look at some other
Learn moreWhen the world started to work-from-home, cybercriminals changed their focus. VPN technology, such as Pulse Secure’s Connect VPN, became a focus of attacks. For example, vphishing (voice phishing) is widely used in an attempt to steal employees’ VPN credentials and access their organization’s network either…
Learn more
Malware threats are born, and they may fade, but the most effective – and...

The mobile banking trojan Wroba has been around since 2010. It previously targeted smartphone...

Welcome to our Q3 2020 Malware Threat Report. Our previous malware threat report for...

Avira’s IoT research team has recently identified a new variant of the Mirai botnet....

In our mid-2020 vulnerability update, we will leverage the expert insight of Avira’s Vulnerability...

URL or domain reputation – as found in Symantec’s RuleSpace web categorization database – ...

Introduction Avira’s IoT Labs continues to look for new variants of the Mirai botnet....

Our malware threat report for Q1 2020 highlighted cyber threats and exploits that included,...