A new trojan has been released targeting the Macintosh Chinese-language user community. The trojan appears to the user to be a...
Google+ seems to be continuing building steam and putting itself on the map as a contender, not merely an also-ran to the...
The United States Attorney Office for the Southern District of New York received a flurry of attention in April, 2011 when they...
Recently, we’ve noted a steep rise in Android malware and predicted the rise in banking malware, now we see another example in...
Internet scams are not new, and some of the strategies they use are not unique to the Internet, but there is no...
With all the recent headlines about data breaches, should your organization hire a “thief to catch a thief?” That’s a question Kevin...
ESET has discovered a new version of the Delphi infector, Win32/Induc. Unlike its predecessors, however, this variant incorporates a seriously malicious payload...
The authors of Win32/Qbot (a.k.a. Qakbot) are back with new variants of this infamous malware, and this time the binaries are digitally...
Awhile back we mused that the rapid rise in Android malware would hit its stride near the intersection of widespread mobile financial...
…but it doesn't necessarily want you to be free. Since Cameron Camp and I have written here and here about the implications of the...
You may be aware that Cameron Camp and I regularly write articles for SC Magazine's Cybercrime Corner: here here's a catch-up list of the...
Okay, so they grew from nothing to ubiquity in a few years, hey, my mom has an account. With the growth, users...
Can’t find a way to support a hacktivist with your l337 sK1LLz? Turns out they take tips, bitcoin tips. We mused awhile...
Is that possible? Well, a researcher with Identity Finder, Aaron Titus, believes so, since he says he managed to use internet searches...
... people have been asking me about Google's interesting paper on Trends in Circumventing Web-Malware Detection...
Nearly three years old, the Conficker worm continues to pose a threat to PCs. Aryeh Goretsky wants to know why this is,...
Aryeh Goretsky interviewed, as his paper on Possibly Unwanted Applications is published.
I have an Android in my pocket as I type, with all kinds of cool apps ranging from GPS navigation to acoustic...
On the heels of the recent activity with Stuxnet, the industrial process control computer worm that targeted Iranian nuclear centrifuges, a Blackhat...
Among the many different trojans that spread on Facebook, something popped up recently that caught our particular attention. The threat, detected...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment