By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network.
Finnish authorities nabbed Russian citizen Maxim Senakh, wanted in the U.S. on computer fraud charges for spreading malware.
The Regin Trojan is alive thriving in the wild despite being uncovered by Symantec last year.
A team of researchers created an app vetting scanner referred to as "MassVet," and used it to identify 127,429 malicious apps on 33 Android markets.
Malware author Morgan Culbertson pleaded guilty on Tuesday in a Pittsburgh federal court.
Cyphort Labs's latest study on malvertising indicates a massive uptick with this form of attack has taken place over the last few years driven, in part, by the proliferation of zero-day and Angler kit exploits.
A Hong Kong-based website has been compromised to serve up malware through a just patched memory corruption vulnerability in Internet Explorer.
Zscaler has been seeing attackers targeting WordPress sites running version 4.2 and lower.
The FBI announced that Darkode hacker Eric Crocker, known as "Phastman," pleaded guilty on Monday for sending spam.
Drivers in the Washington, D.C. metro area are being targeted by a phishing scam that purports to come from E-ZPass.
Hackers went old school during the first half of 2015, resurrecting the use of malicious email attachments and also began targeting businesses with a new stream of phishing attacks, according to Proofpoint's first half threat report.
Researchers have spotted attackers using fake Facebook accounts to post malicious links in the comments of popular content.
Researchers at Malwarebytes uncovered a malvertising campaign against AdSpirit.de, similar to the one used recently on Yahoo.
The malware was detected by Fortinet as Android/Locker.CB!tr and is capable of receiving a variety of commands.
Researchers say that campaigns leveraging the Asprox botnet have disappeared after reaching a peak last year.
The Darkhotel APT group swapped out its previous Flash zero-days this past month for an exposed Hacking Team zero-day.
U.K. ham radio operators are the target of a phishing scam asking them to open a malware-infected attachment purportedly from Ofcom Spectrum Licensing.
If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That's the way we used to do it back in the '80s and '90s, but does this approach still work?
The same hackers that have exploited vulnerabilities of Adobe Flash have used advertising on Yahoo's largest websites to distribute malware to billions.
Remote Access Trojans (RATs) proliferate through YouTube tutorials and hacker forums, a new report from Digital Citizens Alliance suggested.
Potao was first being used against targets in Russia, but after a lull in activity, malware activity increased against targets in Ukraine.
Cybersecurity firm FireEye released a new report on APT29's complex malware HAMMERTOSS.
Researchers at Dr. Web have discovered a faulty trojan designed as a backdoor for Linux that could also target Windows systems.
Israeli researchers detailed a new attack that can steal data from air-gapped computers, which are often seen as relatively safe.
The Duke APT group continues to change up its tactics with the new "SeaDuke" and "CloudDuke" malware.
The threat is detected by Avast as Clicker-AR, and by requesting a certain permission it can redirect Android users to porn sites via their browser or other apps.
Vulnerabilities and other threats exposed in the Hacking Team leaks has spurred Rook Security and Facebook to each release free security tools.
Windows XP infections are set to skyrocket as Microsoft finally ends support for its anti-malware and malicious software removal tool.
Researchers with Trend Micro observed the malware threat being distributed predominately in the U.S. and Canada.
Mainly known for its targeting of gaming files, TeslaCrypt continues to re-up its techniques to make it a debilitating threat.
Sign up to our newsletters
SC Magazine Articles
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks
- Class action complaint filed against IRS over data breach