An active Microsoft Office and Wordpad spam campaign is targeting European users with files that allow attackers to exploit the CVE-2017-11882 vulnerability.
The ransomware evolution continues: 2019 data shows changes in volume of threats and a shift in targets. New evasion techniques and distribution methods are also being deployed by malware creators.
Unknown threats trigger gray alerts from endpoint detection and response (EDR) tools on a day-to-day basis. But what is it about these gray alerts that warrant a deeper look and how can MDR help?
A security researcher, going by the handle SandboxEscaper, published an exploit code for a zero-day vulnerability in Windows' Task Scheduler utility. Here's what you need to know.
Security researchers uncovered a new malware targeting Linux systems: HiddenWasp. Learn its backdoor and rootkit capabilities — and how users and organizations can defend against this threat.
Understanding the threats and risks to the IoT is an important step in protecting systems that integrate with it. What kinds of attacks do IoT adopters need to be prepared for?
HawkEye Reborn v8.0 and v9.0, the latest iterations of the old but notorious keylogging malware, were spotted in spam campaigns targeting business users.
Almost a million systems are reportedly vulnerable to BlueKeep (CVE-2019-0708), a critical vulnerability in remote desktop services. Here are some best practices that can help defend against threats that may exploit it.