The WEP and WPA2 wireless security protocols have both been discovered with vulnerabilities such as KRACK that hackers can exploit to compromise devices, spy on users, and perform other malicious activities. How can users secure their wireless connections?
Authorities arrested four suspected leaders of a large-scale business email compromise (BEC) ring that managed to siphon off more than EU 18 million from companies in France and Belgium.
Security researchers warn against increasing SMiShing attacks as punycode is gaining popularity among cybercriminals for malware infection and data theft.
Recently discovered malware MnuBot is making the rounds in Brazil, targeting local banks and their customers with malware families commonly used for fraud in the region.
A persistent Monero-miner malware increases CPU activity and drains the batteries of Mac users, making the hardware prone to system slowdown and overheating.
We delved into the rise and fall of Scan4You, the largest counter antivirus service in the underground, its operators, and the ties that bind them to other cybercriminals.
Researchers discover SynAck ransomware family to be first to use Process Doppelgänging as evasion technique, making it more difficult and complicated for detection and analysis.
Security intelligence researchers found an ongoing spam campaign aimed at infecting as many systems as possible through simultaneous configurations and infection payloads.