Malware News, Articles and Updates
The ransomware PowerWare that commandeers Microsoft's PowerShell utility to download and run malicious code, now has a variant that mirrors Locky ransomware.
CryptXXX ransomware has a doppelganger - it's called CrypMIC. And the resemblance doesn't appear to be a coincidence.
A system integrity feature that prohibits Android mobile devices from booting when the presence of malware is suspected will now be strictly enforced in version 7.0.
Cicis Pizza has officially acknowledged a payment card data breach in 138 of its restaurant locations, after reports of a point-of-sale malware attack first came to light last month.
Google has removed a group of malicious browser extensions from its Chrome Web Store, after an independent researcher discovered the programs were hijacking users' Facebook accounts for click-fraud purposes.
Organisations are increasingly being targeted by ransomware and more often than not pay the ransom to regain control of their data.
A website for the rubber goods brand Dunlop was compromised to distribute ransomware to customers viewing a slideshow of DIY projects featuring its product line, according to endpoint security software firm Invincea.
Kaspersky Lab researchers spotted the Ammyy Admin being used as a dropper trajan to install the Lurk trojan and other malware.
In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.
The Carbanak cybergang which facilitated the heist of $1 billion from banks around the world last year, was linked to the Russian security firm Infocube.
Ironically, the cybercriminals holding your computer files for ransom may be offering you a better customer experience than your average cable provider or insurance company.
A malicious spam email campaign discovered by FireEye, used Microsoft Word attachments containing macros that launched a command and control Cerber installers.
The number of unique malware families found actively attacking business networks grew 61 percent from January 2016 to June, with 2,420 distinct threats detected last month, according to Check Point Software Technologies' June Threat Index.
Delilah trojan designed to target potential insiders via social engineering, extortion, and ransomware tactics.
Three suspects were arrested after a network of Eastern European and Russian cybercriminals used malware to steal $2.5 million in cash from dozens of machines around the country.
The Realstatistics malware campaign discovered in June to be infecting thousands of Joomla! websites gained steam by shifting infection tactics after the introduction of ModSecurity rules closed off its original attack method.
Researchers discover a new strain of the Cerber ransomware targeting Office 365 users. The variant is part of an emerging trend of ransomware that targets victims using cloud platforms.
Researchers discovered a way to detect and block malware in Transport Layer Security (TLS) connections without decrypting the traffic.
The Neutrino Exploit Kit has added another weapon to its arsenal, adopting a working exploit of Microsoft's Internet Explorer browser after an independent security researcher designed and published the source code of said exploit.
For the first time ever, CryptXXX ransomware is being distributed through malicious document attachments in email campaigns.
Russia's defence sector is taking steps to reduce NetTraveler Trojan attacks and some defence manufacturers are postponing computerisation using western technology due to fears of cyber-espionage.
SentinelOne researchers discovered spotted a sophisticated nation-state sponsored malware campaign with potential to knock out an electric grid.
ATMs in Taiwan were spewing money over the weekend in what authorities believe were malware-aided thefts.
When compared to the financial damage a cyberattack can create, the cost of most crimeware-as-a-service (CaaS) offerings looks like a bargain, based on the prices listed in a "Hacking Menu" compiled by WatchGuard Technologies.
ESET researchers spotted and uptick in Nymaim malware detections during the first half of 2016 and noticed a series of targeted attacks in Brazil.
Omni Hotels & Resorts said guests had to physically present payment cards at one of its affected POS systems to be affected by malware stealing payment card information during a six-month period.
Researchers spotted cyber scammers and street crooks looking to take advantage of the success of the popular Pokemon app.
IBM's X-Force Research team reported that the GootKit banking trojan has recently received a facelift with the malware now being harder to spot and a lighter video-capture module.
The financial messaging cooperative SWIFT announced today that it hired two cybersecurity firms and also created a Customer Security Intelligence team in order to bolster cyber defenses, strengthen forensic investigations and promote information sharing.
The 12-year-old Trojan NetTraveler has resurfaced in an APT group's spear-phishing campaign against Russian and Eastern European targets.
SC Magazine Articles
- Cerber ransomware strain now targeting Office 365 users
- Critical infrastructure in Europe exposed to hackers
- Deal with the devil: Ransomware experiment proves you can negotiate price down
- WordPress Summer of Pwnage: 64 holes in 21 days
- Cerber ransomware C&C server shut down by research firm and CERT-Netherlands
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Ransomware attack almost sends NASCAR team to the garage