The group behind a notorious banking trojan have expanded their operations are are now offering to deliver other forms of malware on behalf of other … [Read more...] about Banking malware finds new life spreading data-stealing trojan
LabCorp, one of the largest clinical labs in the U.S., said the Samsam ransomware attack that forced their systems offline was contained quickly and … [Read more...] about Samsam infected thousands of LabCorp systems via brute force RDP
Despite constant warnings by law enforcement and industry organizations, BEC scammers continue to fleece companies. They target small, medium, and … [Read more...] about BEC scams and real estate deals: How to protect yourself?
A cyber espionage campaign is targeting the Ukrainian government with custom-built malware which creates a backdoor into systems for stealing data -- … [Read more...] about Password-stealing, eavesdropping malware targets Ukrainian government
A sophisticated mobile malware campaign is gaining access to iPhones by tricking users to download an open-source mobile device management (MDM) … [Read more...] about Hacking campaign targets iPhone users with data-stealing, location-tracking malware
The ever-expanding range and diversity of cyber threats make it difficult for organizations to prioritize their offensive and defensive strategies … [Read more...] about How to Structure an Enterprise-Wide Threat Intelligence Strategy
Academics say they've mounted a successful GPS spoofing attack against road navigation systems that can trick humans into driving to incorrect … [Read more...] about Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems
Since the Spectre and Meltdown vulnerabilities knocked the glow off of the new year, 2018 has been the year of the CPU bug. Security researchers have … [Read more...] about 8 Big Processor Vulnerabilities in 2018
Despite what movies might show, most hacks don’t involve frantic typing or brute-force attacks. In fact, Verizon’s “2017 Data Breach Investigations” … [Read more...] about The Most Common Hack Is Also the Most Successful. Here’s How to Fight It.
The return of Spectre sounds like the next James Bond movie, but it's really the discovery of two new Spectre-style CPU attacks. Vladimir … [Read more...] about The return of Spectre