We have recently spotted a Negasteal/Agent Tesla variant (detected by Trend Micro as Worm.Win32.NEGASTEAL.B) that uses a new delivery vector: removable drives.
Researchers discovered a vulnerability in Android devices that allows malware to hijack legitimate apps. Using this vulnerability, cybercriminals could trick users into granting permissions to their malicious apps and provide openings for phishing pages.
With the growing popularity of remote working arrangements in enterprises, we revisit the security threats and recommendations for IoT devices interchangeably connected to the network at home and in the office.
The threat actors operating the Emotet malware broke its nearly four-month hiatus by launching a spate of malicious spam emails targeting German-, Italian-, Polish-, and English-speaking users.
A look into the cybersecurity risks surrounding critical infrastructures integrated with industrial internet of things (IIoT), and the recommendations to mitigate against these threats.