SHARE
Facebook X Pinterest WhatsApp

Symantec Warns of Adaptive Malware Threat

In its’ annual "Internet Security Threat Report (ISTR)", the 14th edition of the report, Symantec says it expects that malicious code developers will continue to increasingly adapt attacks in order to evade detection and that some overt attack activities could be abandoned or pushed further underground. Malicious activity will be increasingly pushed to regions with […]

Apr 15, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In its’ annual "Internet Security Threat Report (ISTR)", the 14th edition of the report, Symantec says it expects that malicious code developers will continue to increasingly adapt attacks in order to evade detection and that some overt attack activities could be abandoned or pushed further underground. Malicious activity will be increasingly pushed to regions with emerging infrastructures that may still lack the resources to combat the growing involvement of organized groups in the online underground economy.

The onus will be on organizations, institutions, and other knowledgeable stakeholders in the security of the Internet to work for the benefit of the affected regions, the report read. Internet threat activity is truly global, and malicious activity allowed to flourish in one area could rapidly spread globally in the absence of a comprehensive response from the Internet security community.

>> Click here to read the full report

Recommended for you...

ThreatDown Study Highlights AI-Driven Ransomware Surge
CyberFox Co-Founders on Recent Investment & 2026 Opportunity
Strategies for Container-Related Incidents Impact Security Goals
Jordan Smith
Jan 29, 2026
CrowdStrike’s Daniel Bernard on Nord Security Partnership
Jordan Smith
Jan 28, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.