Cyberattack News, Articles and Updates
Trend Micro researchers found that cybercriminals are using video game currency to launder real world money.
Trend Micro researchers have spotted several exploit kits delivering Cerber 4.0 ransomware just a month after the release of version 3.
A report by the Australian Cyber-Security Centre says that the misuse and over-hyping of cyber-security terms has hampered the public's ability to understand cyber-security issues.
The Obama administration will deliver what is being described as a "proportional" response against Russia in retaliation for that country launching a series of cyberattacks against U.S. political targets.
Phishing remains one of the top threats seen by organisations today. Threat actors use various social engineering tricks to convince users that their requests for information or money transfers are legitimate.
As the number of data breaches increases a recent study found that execs and board members should be more involved in data breach planning.
A recently passed Russian law has given that country's security firms the green light to crack encrypted communications services.
A number of vulnerabilities found in an industrial automation device could allow hackers to take control of machinery.
Researchers at Symantec's Norton division found that Turkey has the largest number of "bot" infections with one bot for every 1,139 internet users.
North Korea is suspect number one in an attack against South Korea's cyber command last month, according to a member of the main opposition party, Minjoo.
The U.S. Army must begin training its soldiers to endure and then continue to fight after suffering a cyberattack on the battlefield.
The malware spreads by continuously scanning the web for vulnerable devices using default or hard-coded usernames and passwords.
DressCode malware spotted in thousands of apps and could pose a serious threat to enterprise networks.
Sucuri researcher Daniel Cid found that it only took an attacker 12 minutes to compromise an IPv4 server, and shortly after launch DDoS attacks.
A new report by the NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) has shown a comprehensive overview of the evolving Chinese cyber-structures.
The Android.Lockerscreen ransomware is now using pseudorandom numbers and other tactics to prevent victims from unlocking devices without paying.
Tesla has releases a major firmware update in response to a video posted by a group of Chinese researchers that displayed a series of vulnerabilities the electric car company's vehicles.
Malwarebytes researchers spotted a large malvertising campaign delivering the RIG exploit kit on popular sites including answers(dot)com.
Avast researchers examined some of the marketing tactics used by Janus Cybercrime Solution, the cybergang behind the Petya and Mischa
For the second time this year, Discover Financial Services reported a set of data breaches on the same day to the California Attorney General's Office.
While the information stored in internet of thing (IoT) devices is still valuable, researchers spotted an increase in attacks targeting IoT devices.
While it might not include the Death Star cyber warfare among the stars is almost inevitable.
The number of malicious apps leveraging top UK brands has grown by 130 percent year on year.
The White House has announced a cyber-security breach, as a purported photocopy of Michelle Obama's passport appears online.
As yet another well-known consumer brand falls victim to 'old version syndrome' and serves up malware to its customers; we ask, why lessons aren't being learned?
CyberArk's 10th annual Global Advanced Threat Landscape Survey conducts research on global enterprises and whether they are learning from cyber-attacks and what priorities are being influenced.
Researchers claim they were able to crack into Tesla's CAN Bus to achieve remote control of the electric car and the DoT just issued a new policy concerning automated vehicles.
A Tripwire survey found IT staffers in the energy sector frequently don't have the data needed to see if their assumptions on how their security apparatus function are correct.
The attacks targeted major companies that provide internet infrastructure and appear to have probed the companies' defenses to determine capabilities.