The modular malware was named "Ventir," by researchers at Kaspersky.
The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.
The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.
The campaign targeted users running vulnerable versions of Internet Explorer.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
Sears revealed in a filing to the SEC that Kmart systems were infected with malware "undetectable" by current AV solutions.
Journalist Brian Krebs said the company is sending out advisories to clients saying it would remove the certificate after a 2010 security incident.
Attackers used a third-party vendor's credentials to compromise systems in 395 U.S. Dairy Queen locations and one Orange Julius site.
Roman Seleznev is now charged in a 40-count indictment brought by a federal grand jury in Seattle.
A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.
A new Facebook scam leverages the popularity of the British actress to infect users with a trojan that steals data and signs up victims to a premium SMS scam.
The malware allowed criminals, with physical access to ATMs, to steal millions, Kaspersky revealed.
After more than 18,000 Macs were infected with iWorm malware, Apple has updated its XProtect system to identify and block certain variants.
The purpose is to add compromised systems to botnets that are primarily focused on launching DDoS attacks.
As the reach of a recent Chase breach grows to 76 million household and seven million business accounts, security experts call for change.
Doctor Web researchers have discovered a new malware that is being used to amass Macs into a giant botnet.
The Electronic Frontier Foundation says the spyware sports a keylogger and is widely distributed by law enforcement agencies.
Two months after SR Labs demonstrated that flaws allow malware to infect USB devices, two researchers have taken the code public.
The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.
Police are not naming the malware used, but speculation casts an eye on Backdoor.Ploutus or Backdor.PadPin.
The portal is a virus analysis tool that examines suspicious files and shares information about them.
Next year, EMV migration in the U.S. will inevitability change fraudsters' attack methods.
Signature Systems, Inc. confirmed that 108 other businesses were impacted by the malware installed on its systems.
The CryptoWall ransomware being delivered comes with a valid digital signature and initial VirusTotal results showed zero detections.
The Wall Street Journal reported that a Secret Service investigation uncovered malware customized to attack Home Depot.
Researchers with Proofpoint have analyzed a version of the Dyre banking trojan that has been updated with new features.
A phishing attack may have resulted in the theft of personal information belonging to customers of Japan Airlines's frequent flier club.
Akamai's PLXsert researchers analyzed the new DDoS toolkit.
The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework.
Seculert researchers discovered a variant of the Tinba banker trojan that can infect more systems and better skirt detection.