SHARE
Facebook X Pinterest WhatsApp

Symantec Warns of Adaptive Malware Threat

In its’ annual "Internet Security Threat Report (ISTR)", the 14th edition of the report, Symantec says it expects that malicious code developers will continue to increasingly adapt attacks in order to evade detection and that some overt attack activities could be abandoned or pushed further underground. Malicious activity will be increasingly pushed to regions with […]

Apr 15, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In its’ annual "Internet Security Threat Report (ISTR)", the 14th edition of the report, Symantec says it expects that malicious code developers will continue to increasingly adapt attacks in order to evade detection and that some overt attack activities could be abandoned or pushed further underground. Malicious activity will be increasingly pushed to regions with emerging infrastructures that may still lack the resources to combat the growing involvement of organized groups in the online underground economy.

The onus will be on organizations, institutions, and other knowledgeable stakeholders in the security of the Internet to work for the benefit of the affected regions, the report read. Internet threat activity is truly global, and malicious activity allowed to flourish in one area could rapidly spread globally in the absence of a comprehensive response from the Internet security community.

>> Click here to read the full report

Recommended for you...

Vectra AI Product Leader on NDR, AI & Identity Demand
Victoria Durgin
Dec 11, 2025
ISC2 Report Shows AI Excitement, Risk Worry, and Burnout
Syncro & CyberDrain Launch MSP Microsoft Security Assessment
Luis Millares
Dec 2, 2025
1Password vs Bitwarden: 2026 Password Manager for MSPs
Luis Millares
Dec 2, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.