Phishing schemes and rogue mobile applications continued to be heavily used by cybercriminals to defraud users and organizations in the first quarter of 2019, according to new report.
Cybercriminal group ScarCruft has recently developed Bluetooth device-harvesting malware that collects Bluetooth device information such as names, device addresses, device types, as well as connection and authentication information.
The sustained prevalence of brand impersonation in phishing attacks is further demonstrated in a new report which listed the most impersonated brands in the first quarter of 2019.
The source code of the notorious Carbanak backdoor, which was linked to several high-profile data breaches, was found on the VirusTotal platform. What does this mean to enterprises?
Trend Micro researchers uncovered a sextortion scheme targeting Italian-speaking users. The scheme is notable in that the hackers are now also using Bitcoin Cash as one of their preferred cryptocurrencies.