Security researchers uncovered that a version of Jigsaw, an old ransomware, has resurfaced as a bitcoin stealer. Its operators have already netted 8.4 bitcoins (US$66,807 as of July 24, 2018) using the repurposed malware.
A new Rakhni variant was found with the ability to decide whether to install ransomware or cryptominers. It also has a worm component, installs spyware, and can disable Windows Defender.
Researchers discover SynAck ransomware family to be first to use Process Doppelgänging as evasion technique, making it more difficult and complicated for detection and analysis.
Security intelligence researchers found an ongoing spam campaign aimed at infecting as many systems as possible through simultaneous configurations and infection payloads.
We look at some of the defining moments in the threat landscape that helped steer organizations toward adding proactive incident response strategies to their cybersecurity defenses.
SAMSAM ransomware is suspected to hit systems used by the city of Atlanta's local services, causing outages on customer facing applications, including some that customers may use to pay bills or access court-related information.
As environments become progressively interconnected, threats become increasingly complicated. The top security events of the past year make this apparent — and their repercussions make the implementation of smart protections all the more important.
We looked into the state of email threats and security in 2017 to provide a clearer picture of what organizations are up against — and what can protect them.
We delved into 2017’s most notable threats to see what lies ahead in the mobile landscape, and what users and organizations can do to navigate it in 2018 and beyond.