PyRoMineIoT malware infects systems with a Monero miner, spreads using RCE EternalRomance by removing or modifying accounts and passwords with privileged access, and scans for vulnerable Internet of Things devices for possible future attacks.
Recently discovered malware MnuBot is making the rounds in Brazil, targeting local banks and their customers with malware families commonly used for fraud in the region.
A persistent Monero-miner malware increases CPU activity and drains the batteries of Mac users, making the hardware prone to system slowdown and overheating.
Researchers reported that over a hundred Android devices had been preinstalled with the adware Cosiloon, affecting more than 18,000 gadgets in more than 100 countries.
VPNFilter malware has infected routers in more than 54 countries and can be used for attacks, intelligence collection, and destroying devices in a single command worldwide, affecting both enterprise and home networks.
Researchers discover SynAck ransomware family to be first to use Process Doppelgänging as evasion technique, making it more difficult and complicated for detection and analysis.
We look at some of the defining moments in the threat landscape that helped steer organizations toward adding proactive incident response strategies to their cybersecurity defenses.
Data from five million credit and debit cards was put up for sale on the dark web last March 28. Security researchers investigating the sale traced the data back to Saks Faith Avenue and other stores under the Hudson's Bay company.
We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.