Contact Us

Contact Us

Please get in touch using the form below

1000 characters left
View our privacy policy

Overview

Safeguard critical data and assets against the latest threats

By infecting computer systems and stealing or destroying data, malware, such as viruses, worms, trojans, spyware and ransomware, is an increasing threat to your business’s cyber security.

Over a third of identified breaches are reported to involve malware, making it important to have appropriate controls in place to detect and respond to attacks before they cause significant damage.

Types

Common types of malware

Virus

A virus is a form of malware that attaches itself to macro-enabled documents and programs in order to infect files and move from host to host.

Worm

A worm compromises hosts by exploiting software vulnerabilities and spreads by replicating itself without human interaction or the need to attach itself to any other program.

Trojan

Trojans, or Trojan horses, are forms of malware that disguise themselves as legitimate software to trick users into executing them on target systems.

Spyware

Spyware secretly installs itself on computers and collects information about its hosts, such as web browsing activity and keystroke logs.

Adware

Adware is a type of program designed to display targeted advertising, which can be used maliciously to swamp users with unwanted ads and popups. Malvertising can also be used to inject malware-laden ads into legitimate advertising networks.

Ransomware

Ransomware is a form of malware designed to cause widespread disruption by infecting multiple systems on a network, locking down machines and demanding a ransom for their return or decryption.

Fileless malware

Fileless malware, or memory-resident malware, writes itself directly onto a computer’s memory to help evade detection and maximise dwell time.

Crypto-malware

Crypto-malware, the malware behind cryptojacking, is secretly installed onto unsuspecting hosts through phishing or browser-based script injection in order to harness computer processing power for the purpose of mining cryptocurrency.

Hybrid malware

The majority of malware-based threats display a wide variety of characteristics, making it difficult to classify them within a single category.

Polymorphic malware

Many types of malware can also be polymorphic – capable of constantly changing their characteristics to avoid detection by signature-based antivirus and antimalware solutions.

Ransomware

The rise of ransomware

Ransomware attacks, in particular, have increased rapidly in recent times and are now a ubiquitous threat to all organisations. By spreading quickly, locking down files and demanding a ransom for their decryption, ransomware is capable of causing significant disruption in a matter of minutes.

The WannaCry ransomware outbreak is just one high profile example of an attack that caused widespread disruption, affecting over 200,000 organisations in 150 countries. Cybercriminals can instigate attacks like these using basic and easily accessible components, highlighting the need for organisations to keep software patched, improve employee cyber awareness and detect malicious activity in its infancy.

A laptop that has been locked due to ransomware

Protecting against malware

Security assessments

Identify and address vulnerabilities

The fast-evolving digital landscape means that new vulnerabilities, and new exploits designed to take advantage of them, appear on a daily basis. One of the most effective ways to stay on top of the latest threats is to perform regular security testing.

As a provider of CREST-approved penetration testing as well as vulnerability assessment, social engineering and red teaming services, Redscan’s ethical hacking team has extensive experience of assessing organisations’ technology, personnel and processes against the latest attack techniques and helping organisations to address them.

Kroll Responder MDR

Proactive network and endpoint monitoring to detect early signs of attack

Firewalls and antivirus software are unable to comprehensively defend against the latest types of memory-resident and polymorphic malware.

Kroll Responder, Redscan’s award-winning Managed Detection and Response service, provides round-the-clock security monitoring for a cost-effective monthly subscription.

The service combines certified security professionals, leading detection technologies and cutting-edge threat intelligence to hunt for malware and other cyber threats and help quickly shut them down.

ThreatDetect MDR

Challenges

Other security challenges

Our Services

Our award-winning services

Redscan’s security services are designed to provide the vital assistance needed to make tangible improvements to your organisation’s cyber security posture.

ThreatDetect MDR

Managed Detection and Response

Award-winning support to rapidly detect and respond to the latest threats 24/7

Read more
Specialist engagements to uncover and address hidden cyber security risks

Assessment Services

Specialist engagements to uncover and address hidden cyber security risks

Read more
A person choosing from a range of Managed Security Services

Managed Security Services

Expert help to manage and monitor your choice of security technologies

Read more

Get in touch

Complete the form for a prompt response from our team.

Two Redscan team members analysing cyber security intelligence

1000 characters left
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
22nd April 2024
Quishing attacks increase tenfold
According to new research, quishing attacks, a type of phishing that leverages QR codes, have significantly increased, rising from 0.8% in 2021 to 10.8% in 2024.
15th April 2024
Half of UK businesses affected by cyber-incident in the past year
According to a new report by the UK government, half of UK businesses have reported a cyber incident or data breach in the past 12 months.  
8th April 2024
Infostealers prominent in retail cyber-attacks
New research has highlighted that the use of infostealers dominated in cyber-attacks on retailers over the past year.  
2nd April 2024
Zero-day vulnerabilities soared by over 50% between 2022 and 2023
In a new report Google has revealed that the volume of zero-day vulnerabilities it detected rose by over 50% from 2022 to 2023, with bugs in third-party components on the increase.