Contact Us

Contact Us

Please get in touch using the form below

I prefer to be contacted by:
View our privacy policy
Learn about the best practices for developing SIEM use cases. Join our webinar on August 4th.

Overview

Safeguard critical data and assets against the latest threats

By infecting computer systems and stealing or destroying data, malware, such as viruses, worms, trojans, spyware and ransomware, is an increasing threat to your business’s cyber security.

Over a third of identified breaches are reported to involve malware, making it important to have appropriate controls in place to detect and respond to attacks before they cause significant damage.

Types

Common types of malware

Virus

A virus is a form of malware that attaches itself to macro-enabled documents and programs in order to infect files and move from host to host.

Worm

A worm compromises hosts by exploiting software vulnerabilities and spreads by replicating itself without human interaction or the need to attach itself to any other program.

Trojan

Trojans, or Trojan horses, are forms of malware that disguise themselves as legitimate software to trick users into executing them on target systems.

Spyware

Spyware secretly installs itself on computers and collects information about its hosts, such as web browsing activity and keystroke logs.

Adware

Adware is a type of program designed to display targeted advertising, which can be used maliciously to swamp users with unwanted ads and popups. Malvertising can also be used to inject malware-laden ads into legitimate advertising networks.

Ransomware

Ransomware is a form of malware designed to cause widespread disruption by infecting multiple systems on a network, locking down machines and demanding a ransom for their return or decryption.

Fileless malware

Fileless malware, or memory-resident malware, writes itself directly onto a computer’s memory to help evade detection and maximise dwell time.

Crypto-malware

Crypto-malware, the malware behind cryptojacking, is secretly installed onto unsuspecting hosts through phishing or browser-based script injection in order to harness computer processing power for the purpose of mining cryptocurrency.

Hybrid malware

The majority of malware-based threats display a wide variety of characteristics, making it difficult to classify them within a single category.

Polymorphic malware

Many types of malware can also be polymorphic – capable of constantly changing their characteristics to avoid detection by signature-based antivirus and antimalware solutions.

Ransomware

The rise of ransomware

Ransomware attacks, in particular, have increased rapidly in recent times and are now a ubiquitous threat to all organisations. By spreading quickly, locking down files and demanding a ransom for their decryption, ransomware is capable of causing significant disruption in a matter of minutes.

The WannaCry ransomware outbreak is just one high profile example of an attack that caused widespread disruption, affecting over 200,000 organisations in 150 countries. Cybercriminals can instigate attacks like these using basic and easily accessible components, highlighting the need for organisations to keep software patched, improve employee cyber awareness and detect malicious activity in its infancy.

A laptop that has been locked due to ransomware

Security assessments

Identify and address vulnerabilities

The fast-evolving digital landscape means that new vulnerabilities, and new exploits designed to take advantage of them, appear on a daily basis. One of the most effective ways to stay on top of the latest threats is to perform regular security testing.

As a provider of CREST-approved penetration testing as well as vulnerability assessment, social engineering and red teaming services, Redscan’s ethical hacking team has extensive experience of assessing organisations’ technology, personnel and processes against the latest attack techniques and helping organisations to address them.

ThreatDetect™ MDR

Proactive network and endpoint monitoring to detect early signs of attack

Firewalls and antivirus software are unable to comprehensively defend against the latest types of memory-resident and polymorphic malware.

ThreatDetect™, Redscan’s award-winning Managed Detection and Response service, provides round-the-clock security monitoring for a cost-effective monthly subscription.

The service combines certified security professionals, leading detection technologies and cutting-edge threat intelligence to hunt for malware and other cyber threats and help quickly shut them down.

ThreatDetect MDR

Challenges

Other security challenges

Our Services

Our award-winning services

Redscan’s security services are designed to provide the vital assistance needed to make tangible improvements to your organisation’s cyber security posture.

ThreatDetect MDR

Managed Detection and Response

Award-winning support to rapidly detect and respond to the latest threats 24/7

Read more

Assessment Services

Specialist engagements to uncover and address hidden cyber security risks

Read more
A person choosing from a range of Managed Security Services

Managed Security Services

Expert help to manage and monitor your choice of security technologies

Read more

Get in touch

Complete the form for a prompt response from our team.

I prefer to be contacted by:
View our privacy policy

Resources

Discover our latest content and resources

From the blog
From the blog Case studies Latest news
26th July 2021
Survey reveals 86% of UK businesses expect cyber-attacks to increase in next 12 months
A new survey has revealed that 86% of UK companies anticipate an increase in cyber-attacks over the next 12 months with phishing attacks seen as the biggest threat.  
20th July 2021
IoT malware attacks rose 700% during the pandemic
A new study has revealed that IoT malware attacks increased by 700% during the pandemic. The research analysed IoT devices left on corporate networks when businesses changed to remote working.
12th July 2021
Cybercrime costing organisations around £1.29 million a minute
A new analysis of the volume of malicious activity on the internet has revealed that cybercrime costs organisations around $1.79m (£1.29m) every minute.
23rd June 2021
Disjointed and under resourced: cyber security across UK councils
Our UK council FOI report reveals a disjointed approach to cyber security across the sector, with councils reporting hundreds of data breaches annually and many failing to provide adequate security training for staff. Read our report here.