Malware News, Articles and Updates
An APT group has distinguished itself employing PowerShell in its coding platform used to distribute malware.
As Election Day approaches, researchers have detected a marked uptick in malicious cyber campaigns that seek to capitalize on the highly contentious 2016 race for president.
Russian advanced persistent threat group Sofacy has another ace up its sleeve: a Flash Player exploit tool, dubbed DealersChoice, that in some ways resembles a Russian nesting doll.
Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.
Sierra Wireless issued a warning to users urging them to change their default factory credentials.
"I ain't afraid of no Ghost Push?" Better think again if you're an Android user with a device operating on anything lower than version 6.
An adult video scam that was discovered infecting Russian Facebook users back in April is now targeting Europeans, Kaspersky Lab reported via its Securelist blog.
The bad actors behind a new malware contagion are exploiting the desperation of American college graduates looking for relief from their student debt.
Researchers have spotted a clever trojan designed to take advantage of both a person's vanity and new security verification methods now being introduced.
Despite a glut of research into new ransomware families, low-tech threats like phishing attacks and viruses pose a more prevalent threat to small businesses than ransomware.
Thousands of retailers have been hit by credit card detail stealing malware. They way the hackers got in? unpatched software flaws.
A malware infection is to blame for a payment card data breach affecting at least 230 University of Central Florida students, according to Orlando, Florida NBC affiliate WESH, citing school officials.
Since the source code to the Mirai IoT botnet was publicly leaked, researchers at Imperva have uncovered evidence of several low-level DDoS attacks that were likely perpetrated by new users testing out this suddenly accessible tool.
The browser hijacker Youndoo is now adding an extra Chrome profile to victims' machines, copying settings from users' current profiles so they don't notice the difference when their settings are switched, according to Malwarebytes.
A series of related malware campaigns whose m.o. resembles that of the notorious Carbanak gang has been quietly infecting financial targets since January, including users of the SWIFT bank messaging system, according to Symantec.
HTML/FakeAlert, bogus web pages named by ESET, are showing made-up, fake alert messages usually about dummy virus infections, which if true, would harm the computer or affect users' data.
Without users noticing, a new attack enables malware to switch on Apple webcams.
As the holiday shopping season approaches, the newest iteration of point-of-sale malware FastPOS appears to have improved its evasion efforts by using modular architecture.
Brazilian cybercriminals are now duping their victims into entering into a live chat by pretending to be part of a bank's customer service department in order to quickly extract critical personal information.
In their new white paper "Great Crypto Failures," Check Point Software Technologies researchers Ben Herzog and Yaniv Balmas poke fun of common malware encryption errors, and explain why some cybercriminals fail to master the art of encryption.
Yahoo called a Reuters report that it allowed secret spying of its customers' email "misleading," but the privacy implications are being debated not only by the tech and legal communities but the public as well.
A backdoor malware campaign dubbed OilRig that in May was discovered targeting organizations in Saudi Arabia is now trying to drill into government entities in Turkey, Israel and the U.S., as well as Qatari companies and organizations.
Several Spotify users are reporting that the streaming music service is serving malware to its users through its advertiser network.
The Shadow Brokers Saturday posted a rant to voice their discontent over the lack of bids for the stolen goods.
The malware spreads by continuously scanning the web for vulnerable devices using default or hard-coded usernames and passwords.
DressCode malware spotted in thousands of apps and could pose a serious threat to enterprise networks.
Security researchers discovered a series of attacks that use written text on answers forums and other legitimate web sites to launch command and control instructions in order to implant malware and evade detection.
Sucuri researcher Daniel Cid found that it only took an attacker 12 minutes to compromise an IPv4 server, and shortly after launch DDoS attacks.
A Trojan named Linux.Mirai has been found to be carrying out DDoS attacks.
Those victims targeted over the past year by the ransomware as a service named Encryptor RaaS may be at a loss to ever recover their encrypted files.