{"id":887832,"date":"2024-12-16T08:15:29","date_gmt":"2024-12-16T02:45:29","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=887832"},"modified":"2024-12-16T08:36:05","modified_gmt":"2024-12-16T03:06:05","slug":"kaspersky-detects-over-467000-malicious-files-daily-in-2024-highlights-surge-in-cyber-threats","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/12\/16\/kaspersky-detects-over-467000-malicious-files-daily-in-2024-highlights-surge-in-cyber-threats\/","title":{"rendered":"Kaspersky detects over 467,000 malicious files daily in 2024, highlights surge in cyber threats"},"content":{"rendered":"<p>Kaspersky\u2019s latest findings reveal a troubling increase in cyber threats, with the global cybersecurity company detecting an average of 467,000 malicious files per day in 2024. This represents a 14% rise in detected threats compared to the previous year, signalling a growing and evolving cyber danger landscape. <\/p>\n<p>The annual Kaspersky Security Bulletin (KSB) reveals that Trojans, a type of malicious software that disguises itself as legitimate programs, saw the most significant surge. The detection of Trojans increased by 33% from 2023 to 2024, underscoring the growing danger they pose to individuals and organizations. Additionally, the use of Trojan-droppers- programs designed to stealthily deliver other types of malware, rose dramatically by 150%.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky\u2019s latest findings reveal a troubling increase in cyber threats, with the global cybersecurity company detecting an average of 467,000 malicious files per day in 2024. This represents a 14% rise in detected threats compared to the previous year, signalling a growing and evolving cyber danger landscape. The annual Kaspersky Security Bulletin (KSB) reveals that Trojans, a type of malicious software that disguises itself as legitimate programs, saw the most significant surge. The detection of Trojans increased by 33% from 2023 to 2024, underscoring the growing danger they pose to individuals and organizations. Additionally, the use of Trojan-droppers- programs designed [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[63,4,12],"tags":[],"class_list":["post-887832","post","type-post","status-publish","format-standard","hentry","category-it-2-the-financial-express","category-newspapers","category-the-financial-express"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/887832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=887832"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/887832\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=887832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=887832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=887832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}