Antivirus

Closing the cybersecurity skills gap

When most people thinking of cybersecurity and cybercrime the first thing they might think of is antivirus software or even anti-malware software. Yet how many of the students who collected their GCSEs or A Levels in the summer will know what a CISO is? A cryptographer? A threat hunter? A malware analyst? A penetration tester? The…

When most people thinking of cybersecurity and cybercrime the first thing they might think of is antivirus software or even anti-malware software. Yet how many of the students who collected their GCSEs or A Levels in the summer will know what a CISO is? A cryptographer? A threat hunter? A malware analyst? A penetration tester?

The latter may elicit giggles, but all of these absolutely essential job roles in IT security are likely to be met with blank faces by the vast majority of students starting to think about their future career.

Despite the UK’s cybersecurity sector being worth over $5 billion and widely regarded as the largest in Europe, it suffers from a real (and growing) scarcity of talent. More than half of all businesses and charities are facing a basic technical cybersecurity skills gap, falling to 18% in the public sector.

We hear so much about how the younger generation are inseparable from their devices and can master new technologies and apps far faster than their older peers. At the same time, we also hear about (or experience) the damage of data breaches and hacks to personal accounts, companies, and national infrastructure.

In this current digital-first climate, why then are we not seeing more young people pursue careers in IT security? This is even more puzzling when we consider the rising cost of a university education and growing scrutiny of the value of degrees. To put it in perspective: the average annual salary for jobs in cybersecurity is £72,500 and could be higher for pentest jobs, a good deal more than the average grad salary of £23,000. It’s not only our young people who are potentially missing out – but the UK economy too.

About the author

James Lyne is the CTO at the SANS Institute.

A threat to national secur

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Bitdefender Total Security review: One of the top antivirus options you can buy

Bitdefender bundles antivirus and anti-malware with other digital privacy tools to keep you safer. Here’s how it works…

Bitdefender bundles antivirus and anti-malware with other digital privacy tools to keep you safer. Here’s how it works…
Read More

Continue Reading
Antivirus

Best free antivirus 2024: Keep your PC safe without spending a dime

A lot of time is spent looking at the best paid antivirus suites, but free antivirus solutions are worth discussion, too. After all, free versions are based on their paid counterparts. Good news is, when you see a free alternative to a paid version you like…

A lot of time is spent looking at the best paid antivirus suites, but free antivirus solutions are worth discussion, too. After all, free versions are based on their paid counterparts.

Good news is, when you see a free alternative to a paid version you like…
Read More

Continue Reading
Antivirus

Avast security tools hijacked in order to crack antivirus protection

Researchers spot new campaign that can turn off antivirus protection Malware uses legitimate Avast Anti-Rootkit driver to access kernel level Once antivirus is deactivated, the malware can proceed without detection Hackers are using a legitimate Avast Anti-Rootkit driver to disguise their malware, turn off antivirus protection, and infect systems, experts have warned. The vulnerable driver


  • Researchers spot new campaign that can turn off antivirus protection
  • Malware uses legitimate Avast Anti-Rootkit driver to access kernel level
  • Once antivirus is deactivated, the malware can proceed without detection

Hackers are using a legitimate Avast Anti-Rootkit driver to disguise their malware, turn off antivirus protection, and infect systems, experts have warned.

The vulnerable driver has been exploited in a number of attacks since 2021, with the original vulnerabilities being present since at least 2016, research by Trellix, has claimed, noting the malware can use the vulnerable driver to end the processes of security software at the kernel level.

The malware in question belongs to the AV Killer family, with the attack using a vector known as bring-your-own-vulnerable-driver (BYOVD) to infect the system.

Virus can turn off antivirus

Trellix outlined how the malware uses a file named ‘kill-floor.exe’ to place the vulnerable driver named ‘ntfs.bin’ into the default Windows user folder, before using the Service Control executable (sc.exe) to register the driver using the ‘aswArPot.sys’ service.

Included within the malware is a hardcoded list of 142 processes used by common security products, which is used to check system process snapshots for any matches.

The malware then uses the ‘DeviceIoControl’ API to run the relevant commands to end the process, thereby preventing the antivirus from detecting the malware.

The hardcoded list includes processes belonging to a number of security products from names such as McAfee, Avast, Microsoft Defender, BlackBerry, Sophos, and many more.

As BleepingComputer points out, this isn’t the first time a BYOVD attack has exploited a vulnerable Avast driver, with the 2021 Avoslocker ransomware attacks abusing an Avast Anti-R

Read More

Continue Reading
Antivirus

The best antivirus software for staying protected online

The top antivirus software options to protect your personal and financial data when shopping or browsing online…

The top antivirus software options to protect your personal and financial data when shopping or browsing online…
Read More

Continue Reading