Cybercriminal group ScarCruft has recently developed Bluetooth device-harvesting malware that collects Bluetooth device information such as names, device addresses, device types, as well as connection and authentication information.
The sustained prevalence of brand impersonation in phishing attacks is further demonstrated in a new report which listed the most impersonated brands in the first quarter of 2019.
The source code of the notorious Carbanak backdoor, which was linked to several high-profile data breaches, was found on the VirusTotal platform. What does this mean to enterprises?
Trend Micro researchers uncovered a sextortion scheme targeting Italian-speaking users. The scheme is notable in that the hackers are now also using Bitcoin Cash as one of their preferred cryptocurrencies.
Personal health information of over 350,000 consumers were potentially compromised after nine employees of the Oregon Department of Human Services (DHS) fell victim to a phishing attack.