In other push-based web threats, malware authors use social engineering such as enticing... One of the most recent mobile technological wonders The Coinhive software was throttled to use...
News and information on emerging malware and threats for enterprise cybersecurity teams
Stay ahead of the game with our latest review on macOS malware threats. Learn about the top techniques used by threat actors to deliver malware and how to build more resilient defenses.
The growing numbers of Mac computer users not only need to worry about the recent emerging threats of OSX malaware, but they have something new to be...
Key Takeaways ; Proofpoint researchers have long tracked clusters of malicious activity using banking malware to target users and organizations in Brazil and surrounding countries. Recently, researchers observed multiple threat clusters targeting Spain from threat actors and malware that have traditionally targeted Portuguese and Spanish speakers in Brazil, Mexico, and other parts of the Americas. While the targeting of victims in the Americas has been common for some time, recent clusters targeting Spain have been unusual in frequency and volu ...
Over the years, TAG has analyzed a range of persistent threats including COLDRIVER (also... of malware. COLDRIVER continues its focus on credential phishing against Ukraine, NATO countries...
CRIL analyzes a recent spam campaign that utilizes PowerShell-Backed Steganography employed by a threat actor for Malware Dissemination.
Malware strains come and go while Internet users become more and more accustomed to online threats being dealt with swiftly... in recent history, Emotet. Keep reading to find out what it is...
Summary BlackTech has been known to create Linux versions of malware they have used in attacks against Windows hosts. Recently, JPCERT/CC discovered ELF_PLEAD,
Introduction ; In 2016, researchers from the University of Illinois left 297 unlabelled USB flash drives around the university campus to see what would happen. 98% of the dropped drives were picked up by staff and students, and at least half were plugged into a computer in order to view the content. For a hacker trying to infect a computer network, those are pretty irresistible odds. USB devices have been around for almost 20 years, offering an easy and convenient way to store and transfer digital files between computers that are not directly c ...