SHARE
Facebook X Pinterest WhatsApp

Symantec Warns of Adaptive Malware Threat

In its’ annual "Internet Security Threat Report (ISTR)", the 14th edition of the report, Symantec says it expects that malicious code developers will continue to increasingly adapt attacks in order to evade detection and that some overt attack activities could be abandoned or pushed further underground. Malicious activity will be increasingly pushed to regions with […]

Apr 15, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In its’ annual "Internet Security Threat Report (ISTR)", the 14th edition of the report, Symantec says it expects that malicious code developers will continue to increasingly adapt attacks in order to evade detection and that some overt attack activities could be abandoned or pushed further underground. Malicious activity will be increasingly pushed to regions with emerging infrastructures that may still lack the resources to combat the growing involvement of organized groups in the online underground economy.

The onus will be on organizations, institutions, and other knowledgeable stakeholders in the security of the Internet to work for the benefit of the affected regions, the report read. Internet threat activity is truly global, and malicious activity allowed to flourish in one area could rapidly spread globally in the absence of a comprehensive response from the Internet security community.

>> Click here to read the full report

Recommended for you...

Pathlock CEO Talks Identity in the AI Era
Victoria Durgin
Feb 13, 2026
Video: How Netskope and Optiv Fight Shadow AI
Katie Bavoso
Feb 10, 2026
SpecterOps Unveils BloodHound Scentry, Expanding Identity APM
Luis Millares
Feb 10, 2026
ThreatDown Study Highlights AI-Driven Ransomware Surge
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.