Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.
Researchers with BAE Systems Applied Intelligence have determined that a possibly Russian-fueled malware campaign known as Snake, or Uroburos, may actually date back as far as 2006.
A new HTTPS remote administration tool for Android-based mobile devices has been discovered for sale on underground marketplaces, according to Symantec security researchers.
Researchers have discovered a Gameover variant of the Zeus trojan that has been modified to include the Necurs rootkit, which makes the malware tougher to detect and remove by protecting files on the disk and memory.
The most prevalent threat vector that drives mobile device users to malware are web ads, according to a recent study by Blue Coat.
Attackers have remotely altered DNS configurations for more than 300,000 small office/home office routers, subsequently opening up victims to a host of compromises.
On the same day that an attacker stole 896 bitcoins from Bitcoin bank Flexcoin, an individual allegedly posted the Mt. Gox code on Pastebin.
A Russian agency could be behind a sophisticated piece of malware known as Uroburos that has potentially been stealing confidential data from governments and other high profile targets since as far back as 2011.
Officials are notifying about 1,700 current and former Detroit fire and emergency medical services employees that their personal information may have been compromised by malware that locked City files.
Has mobile malware changed through time as dramatically as the headlines might imply?
In light of the RSA-NSA controversy, a number of speakers, who originally planned to speak at RSA Conference 2014, pulled out and formed a lineup for TrustyCon.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.
YouTube's ad network was compromised to host the Styx exploit kit, researchers found.
Today's targeted attacks use advanced malware designed to defeat IT security controls through a variety of approaches that either confuse or avoid them altogether.
iBanking mobile malware was first introduced to the underground market late last year, according to RSA.
The malware is based on the leaked code of Zeus and RAM-scraping malware.
A RiskIQ report found the number of malicious apps in the Google Play store rose while the number of apps that Google removed dropped precipitously, between 2011 and 2013.
A new variant of the nefarious Zeus banking trojan is concealed in JPG image files, according to the collaborative findings of two researchers.
Experts have discovered new Android malware that sets itself up on a device via drive-by download and allows for remote code execution.
Attackers are looking to capitalize on the demise of Flappy Bird by offering up premium SMS-sending doppelgangers for Android devices.
The most active banking trojan of 2013 was the Gameover variant Zeus, according to the latest research by the experts with the Dell SecureWorks Counter Threat Unit.
SecureMac, a website focused on Mac security concerns, discovered the malware dubbed "CoinThief."
An advanced persistent threat known as Careto, or "The Mask," has been identified by Kaspersky Lab researchers, who also believe that the cyber-espionage operation dating back to 2007 could be a state-sponsored campaign.
At least 4,500 payment cards have been compromised in the United States and Canada by a new point-of-sale malware, JackPOS, that is based on Alina, according to researchers with cyber intelligence company IntelCrawler.
Researchers with cyber intelligence company IntelCrawler have discovered a new point-of-sale malware known as JackPOS, which is said to have code similar to the RAM-scraping POS malware known as Alina.
Target announced last week that hackers compromised its systems using credentials stolen from a third party vendor and, on Thursday, Fazio Mechanical confirmed that it was the victim of an attack.
Executives with Target and Neiman Marcus were among the individuals who testified before the Senate Judiciary Committee on Tuesday.
The Bank of England has released the results of Waking Shark II, a Nov. 12, 2013, four-hour simulated cyber attack in London involving hundreds of financial institutions that was designed to test the city's cyber security readiness.
The Gameover variant of the nefarious Zeus banking trojan has recently been observed sneaking past defenses as an encrypted EXE file, according to researchers with Malcovery.
It's a business owner's worst nightmare; criminals stealing millions of customers' card holder data. Lately, this nightmare has been far too real.