Cylance researchers spotted enhancements on the Qakbot malware that let it infect new systems and lock out administrators.
Hadar Blutrich discusses some of the common ways of handling malware distribution through ads and suggests 'next generation sandboxes' around websites might be able to reduce of these risks.
New exploit kit taking the place of Angler and others as it rapidly evolves to target its victims.
Enterprises are increasingly being hit with exploit kits, especially Rig EK, and the Slammer worm has resurfaced, according to Check Point's latest monthly Global Threat Impact Index.
Attacks believed to be Iranian in origin were fended off for more than two weeks in April, but security experts examining the code detected snippets of code from an underground Russian marketplace.
If you live in Manchester, Orlando, Ottawa or Lisbon, you might want to ask why your cities are getting slammed the worst by malware, according to statistics from an anti-malware company.
Apparently emanating from Iran, Persirai has been detected by researchers at Trend Micro linking more than 1,000 internet protocol (IP) camera models into a vast Internet of Things (IoT) botnet.
A new targeted attack built with readily available software tools has been named Netrepser by researchers at Bitdefender who discovered the attacker.
Two recent cyber-theft campaigns targeting South Koreans employed a three-stage downloader framework that installed the Blackmoon banking Trojan on geo-targeted machines, according to a report Thursday from Fidelis.
A new malware family has been discovered with belief that it has been in use for more than three years to target officials and organisations with ties to North Korea.
A Malwarebytes researcher on Monday discovered a new variant of the "Dokument.app" dropper that was recently found delivering OSX/Dok Mac malware capable of intercepting infected machines' HTTPS communications.
DomainTools discovers more than 300 fake websites fooling customers into thinking they're clicking on top UK bank websites.
Mac users beware as researchers have found yet another reason to rattle the false sense of security some may have concerning Macs and viruses.
The Hajime malware has recruited 300,000 IoT devices to its botnet, but researchers are still baffled as to what the botnet 's purpose may be.
Multiple hacker groups may be collaborating on behalf of a nation-state actor, according to a new report.
Forcepoint Lab researchers spotted a remote access trojan (RAT) dubbed Felismus which has a modular construction that allows it to hide and or extend its capabilities.
Alan Mudd was sentenced to two years in a young offender's institution by a UK court for creating, selling and using Distributed Denial of Service malware.
A London police officer has purchased malware for mobile phones and computers that can intercept calls, emails and more.
Authorities from seven Southeast Asian nations recently collaborated on an operation that exposed regional threats including malware, ransomware, DDoS attacks, and spam campaigns.
The Mirai malware that has created massive botnets out of hijacked Internet of Things devices has met a formidable opponent in Hajime, a rival IOT worm whose intent may possibly be to declaw Mirai.
Cylance said it didn't intentionally mislead customers in an attempt to skew the performance of Protect over its competitors.
Hackers launched an attack against Union Bank of India that was very similar to the attack Bangladesh bank heist that resulted in the theft of $81 million.
The threat actors have reportedly changed the bank-deposit information on the compromised accounts to steal thousands from the users.
The initial attacks began on 20 March when BrickBot 1.0 and 2.0 began pinging a Radware honeypot, Radware said in a security alert.
Dubbed, Sathurbot, the Trojan is disguised in a software torrent containing an apparent installer executable and a small text file.
The Amnesia botnet looks for an unpatched remote code execution vulnerability affecting DVR appliances.
Security researchers at Cisco Talos explain how the ROKRAT malware is leveraging social media to hide its C&C communications in plain sight.