The global cybercrime underground mirrors the globe: it's made up of a patchwork of different countries and unique cultures. See how the cybercrime underground markets truly differ.
There's currently a high demand for Netflix and Uber credentials in the Deep Web and underground markets—perhaps even more than stolen credit card details. It's likely caused by its low cost and potential for more profit.
The blog page of one of the leading media sites in the United Kingdom, “The Independent” has been compromised, which may put its millions of readers at risk of getting infected with ransomware.More details at the Security Intelligence Blog.
From the fallout from the Hacking Team leak to the increased risks of using OS x, iOS, Android, and Flash Player, here's a look at how vulnerabilities shaped the threat landscape so far this year—and what to expect for the second half of 2015.
Sending malicious apps via MMS isn't just the only way to exploit the Stagefright vulnerability. Another flaw in the system's mediaserver component involves its inability to properly handle a malformed MP4 file, which can be exploited.
A Trend Micro researcher discovered tampered Domain Name System (DNS) settings on his home router, prompting him to look at other possible attack scenarios and threats against this device.
Understanding the ecosystem of hardware, software, and services used in each organization’s network, the data/telemetry collected and sent outside it, as well as the challenges caused by the emergence of the Internet of Things (IoT).