The US Department of Justice announced yesterday that Maxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty for his role in the...
The author of the Nuclear Bot banking trojan has leaked the source code of his own malware in a desperate attempt to...
Mac OS X is still secure 16 years after its creation, but increasingly being targeted by cybercriminals. No operating system is 100%...
After last month security researchers discovered the first-ever Word document spreading macro malware on macOS, last week, researchers from Fortinet spotted a...
Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn...
The vast majority of malware incidents that take place at industrial facilities around the world are just accidental infections, albeit a very...
Malware authors in China are using fake base transceiver stations (BTSs), which is equipment usually installed on cellular telephone towers, to send...
Increasingly, cyberattackers have been leveraging “non-malware” attack methods to target vulnerable organizations. Recently, the Carbon Black Threat Research Team was alerted about...
We are seeing a wave of new NSIS installers used in ransomware campaigns. These new installers pack significant updates, indicating a collective...
A new group of POS malware family made its presence targeting business systems around North America and Canada.The objective of PoS malware...
Trend Micro has discovered a new PoS malware, tracked as MajikPOS, that is targeting business in North America and Canada. Security experts...
Android devices have remained the center of attraction for malicious cyber criminals since forever. Not only do they churn out fake, infected...
A scientist’s Team from Graz University of Technology revealed the method that leaking the encryption data from Intel SGX (Software Guard Extensions...
Hancitor has grown into the main five of the ‘most wanted’ malware families worldwide for the first time, reported by Checkpoint Threat Intelligence...
In a research paper published at the end of February, a team of five scientists from the Graz University of Technology has...
Linux has long been the preferred operating system for enterprise platforms and Internet of Things (IoT) manufacturers. Linux-based devices are continually being...
Own a modern-day Android phone? Do not expect it to be an easy slate. As a minimum 36 high-end smartphone fashions belonging...
Mobile Threat prevention Team from Checkpoint Software Discovered Pre-Installed malware in more than 30 android smartphone models belonging to popular Mobile companies...
Malicious apps were surreptitiously added somewhere along the supply chain. A commercial malware scanner used by businesses has recently detected an outbreak...
Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities similar to any desktop. It is clear...
Over the last few years we have received a number of emails with attached Word files that spread malware. Now it seems...