Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Security Statistics and Reports
Windows 10 Pro under attack: Advanced In-The-Wild Malware Test in November 2023
Message
<blockquote data-quote="Adrian Ścibor" data-source="post: 1069630" data-attributes="member: 71496"><p>Dear Community,</p><p></p><p>This is the last edition of the long-term series <u>“Advanced In The Wild Malware Test</u>” in 2023. During this multi-month analysis, conducted 6 times a year in a real environment, we focus on evaluating the effectiveness of software to secure Windows against realistic threats originating from various sources on the Internet. Over the course of this year, we have acquired a lot of telemetry data from the operation of security products and malware. This will allow us to prepare a year-round compilation. We ask you for a moment of patience – <strong>the summary of the Advanced In The Wild Malware Tests from 2023 will be published after the new year.</strong></p><p></p><p>November 2023 was marked by PUAs/PUPs which by a reason of their nature are not malware, but can cause some damage to users with limited technical knowledge. The scale of potentially unwanted software is evident from the fact that almost 25% of web addresses in-the-wild included installers for browser extension, toolbars, or other applications that can be intrusive.</p><p></p><p>In the end, 245 samples of genuine malicious software remained to the test.</p><ul> <li data-xf-list-type="ul">Final Results on single landing page: <a href="https://avlab.pl/en/recent-results/" target="_blank">Recent Results In November 2023 » AVLab Cybersecurity Foundation</a></li> <li data-xf-list-type="ul">Detailed publication: <a href="https://avlab.pl/en/recent-results/" target="_blank">Recent Results In November 2023 » AVLab Cybersecurity Foundation</a></li> <li data-xf-list-type="ul">and Awards: <a href="https://avlab.pl/en/awards/" target="_blank">Awards » AVLab Cybersecurity Foundation</a></li> </ul><p>Wait until the full year summary, where we will write about the tests in more detail.</p><p></p><p>In the next year, we plan to implement more changes on the backend side, improve tools and add support for MS Office files with malicious macros.</p></blockquote><p></p>
[QUOTE="Adrian Ścibor, post: 1069630, member: 71496"] Dear Community, This is the last edition of the long-term series [U]“Advanced In The Wild Malware Test[/U]” in 2023. During this multi-month analysis, conducted 6 times a year in a real environment, we focus on evaluating the effectiveness of software to secure Windows against realistic threats originating from various sources on the Internet. Over the course of this year, we have acquired a lot of telemetry data from the operation of security products and malware. This will allow us to prepare a year-round compilation. We ask you for a moment of patience – [B]the summary of the Advanced In The Wild Malware Tests from 2023 will be published after the new year.[/B] November 2023 was marked by PUAs/PUPs which by a reason of their nature are not malware, but can cause some damage to users with limited technical knowledge. The scale of potentially unwanted software is evident from the fact that almost 25% of web addresses in-the-wild included installers for browser extension, toolbars, or other applications that can be intrusive. In the end, 245 samples of genuine malicious software remained to the test. [LIST] [*]Final Results on single landing page: [URL="https://avlab.pl/en/recent-results/"]Recent Results In November 2023 » AVLab Cybersecurity Foundation[/URL] [*]Detailed publication: [URL="https://avlab.pl/en/recent-results/"]Recent Results In November 2023 » AVLab Cybersecurity Foundation[/URL] [*]and Awards: [URL="https://avlab.pl/en/awards/"]Awards » AVLab Cybersecurity Foundation[/URL] [/LIST] Wait until the full year summary, where we will write about the tests in more detail. In the next year, we plan to implement more changes on the backend side, improve tools and add support for MS Office files with malicious macros. [/QUOTE]
Insert quotes…
Verification
Post reply
Top