Kaspersky Lab has observed Andromeda bot being used to deliver CTB-Locker, a new ransomware that hides its command-and-control server on the Tor network.
A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.
A study by the Information Security Community on LinkedIn found most organizations don't have proper polices and support for BYOD.
Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.
Researchers at Websense say visitors to Metro.us are sent to websites hosting the Rig Exploit Kit, used in the past to distribute CryptoWall.
The command-and-control for a new ransomware identified by Microsoft as Critroni is hidden on the Tor network.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
Shortened URLs on Facebook, leading to a risqué webcam video, are actually being used to spread malware.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
Solutionary's SERT research team analyzed threats for the second quarter for its Quarterly Threat Intelligence Report.
The CryptoLocker copycat ransomware was behind the May breach, the firm said in a notification letter to New Hampshire's attorney general.
On Wednesday, Symantec released details on the malware's developed features.
An RCE vulnerability existing in several Cisco Wireless Residential Gateway products can be exploited to serve up fraudulent advertisements and deliver malware.
Sentinel Labs dubbed the repurposed malware "Gyges."
Lookout has identified a ScarePakage mobile ransomware that renders Android phones inoperable and attempts to extort ransom via MoneyPak vouchers.
As of Wednesday afternoon, 127 SSL certificates associated with malware and botnet activities have been blacklisted.
Popular Japanese adult websites have been compromised to distribute the Aibatook banking trojan, a threat that could make its way to the U.S.
In less than a day, over 6,000 infected machines were updated with the new Pushdo variant.
Google has hired a team of researchers who will be dedicated to digging up vulnerabilities, malware and other threats to internet users.
Trusteer warns that the financial malware was first advertised last week on a major underground forum.
Zberp malware was developed from the source code of Zeus and financial malware Carberp.
The Gameover variant of the nefarious Zeus trojan was disrupted in early June, but researchers with Malcovery are observing a return.
BitDefender, the firm that discovered the ransomware, detailed Cryptolocker's chances of making a comeback.
TrapX was alerted to the zero-day attack when the malware targeted servers with "finance" in their host names.
Using phishing emails, attackers are targeting various industries with unique keylogger malware as part of an ongoing campaign, NightHunter, that dates back to 2009.
CSIS researchers say the full source code for what's been dubbed the "smallest Trojan banker ever discovered" have been leaked in an underground forum.
Trusteer, an IBM company, revealed details on the bolware variants, which employ new tactics to manipulate web pages used for Boletos transactions.
A researcher from Sophos Labs penned a Viral Bulletin warning that VBA macros had reappeared as "simple downloader trojan codes."
In 2013, the banking trojan was deemed one of the most active banking trojans by Dell SecureWorks.
Lecpetex attackers may have infected up to 250,000 computers, Facebook revealed.