Internet scams are not new, and some of the strategies they use are not unique to the Internet, but there is no...
With all the recent headlines about data breaches, should your organization hire a “thief to catch a thief?” That’s a question Kevin...
ESET has discovered a new version of the Delphi infector, Win32/Induc. Unlike its predecessors, however, this variant incorporates a seriously malicious payload...
The authors of Win32/Qbot (a.k.a. Qakbot) are back with new variants of this infamous malware, and this time the binaries are digitally...
Awhile back we mused that the rapid rise in Android malware would hit its stride near the intersection of widespread mobile financial...
…but it doesn't necessarily want you to be free. Since Cameron Camp and I have written here and here about the implications of the...
You may be aware that Cameron Camp and I regularly write articles for SC Magazine's Cybercrime Corner: here here's a catch-up list of the...
Okay, so they grew from nothing to ubiquity in a few years, hey, my mom has an account. With the growth, users...
Can’t find a way to support a hacktivist with your l337 sK1LLz? Turns out they take tips, bitcoin tips. We mused awhile...
Is that possible? Well, a researcher with Identity Finder, Aaron Titus, believes so, since he says he managed to use internet searches...
... people have been asking me about Google's interesting paper on Trends in Circumventing Web-Malware Detection...
Nearly three years old, the Conficker worm continues to pose a threat to PCs. Aryeh Goretsky wants to know why this is,...
Aryeh Goretsky interviewed, as his paper on Possibly Unwanted Applications is published.
I have an Android in my pocket as I type, with all kinds of cool apps ranging from GPS navigation to acoustic...
On the heels of the recent activity with Stuxnet, the industrial process control computer worm that targeted Iranian nuclear centrifuges, a Blackhat...
Among the many different trojans that spread on Facebook, something popped up recently that caught our particular attention. The threat, detected...
What we're lacking here is a clear differentiation between types of "hacktivist" or, indeed, "activist": much of the commentary that's around at...
Forensic software developer PassWare announced a new version of its eponymous software forensics kit on Tuesday. Already several news sources are writing...
Well, really there are far more, but the latest study from Imperva of 10 million attacks against 30 large organizations from January...
The most common malware technique for avoiding detection is to create loads of “fresh” variants. Actually, the component that changes so frequently...
The Business of Hackers-for-Hire Threat Actors
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government
Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’
Critical RCE Bug Could Let Hackers Remotely Take Over DrayTek Vigor Routers
New Woody RAT Malware Being Used to Target Russian Organizations
Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage
VirusTotal Reveals Most Impersonated Software in Malware Attacks
Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike
What is ransomware and how can you defend your business from it?
This is how they use Windows Defender antivirus to encrypt your computer with LockBit Ransomware
Australian Hacker Charged with Creating, Selling Spyware to Cyber Criminals
Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers
Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers
North Korean Hackers Using Malicious Browser Extension to Spy on Email Accounts
CISA Warns of Atlassian Confluence Hard-Coded Credential Bug Exploited in Attacks
Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware