An IoT botnet has set its hooks in about 4,500 - 5,000 proxy devices to send spam emails which each device capable of sending 400 messages or a total of 1.8 million messages per day.
Some Apple product owners have found themselves on the receiving end of a new ransom attack that has someone locking their device most likely using stolen iCloud credentials and the initiating the Find My iPhone remote lock feature.
A recent study on election spam found spammers use candidates with the strongest brands in their lures.
Cryptocurrency miners have increased their use of mining tools that utilize central processing unit (CPU), and to a lesser extent graphic processing units (GPU) specifically those targeting enterprise networks.
In an effort to generate more revenue for the site, The Pirate Bay is quietly running Monero cryptocurrency on the CPU's of its visitors.
Summer 2017 saw a few established exploit kits suck as RIG EK and Magnitude EK along with the few newcomers such as the Disdain EK among its most active EKs of the season.
North Korean hackers are targeting banks and other cryptocurrency outlets as international sanctions appear to take their toll on the Hermit Kingdom.
The ransomware and IOT threat landscapes are merging into a greater threat for transportation sector.
Justin G. Liverman, aka "D3F4ULT" of the "Crackas With Attitude" cybergang was sentenced to five years in prison.
NIST along with vendors and businesses within the cybersecurity community teamed up to develop a recovery guide for firms hit with ransomware attacks.
A person is claiming to have exploited the recent Instagram API breach to scrape the personal data of 6 million users is reportedly selling the data in a searchable website for $10 per query.
Instagram confirmed it was hit by a cyberattack targeting several high profile celebrities.
IoT device pwned by credential attackers once every 120 seconds in SANS research using real connected device rather than honeypot.
PCI DSS compliance doesn't guarantee security, but half of PCI certified companies aren't compliant which does indicate vulnerability to cyber-attack. "It's not a project, it's a programme - something you need to maintain."
Jimmy Nukebot malware trojan becomes more modular to increase flexibility and make static analysis much more complicated - shows ability to adapt to the goals and tasks set before a botnet to take advantage of a new source.
A few weeks before the season finale of popular HBO series "Game of Thrones" Proofpoint researchers spotted a Chinese advance persistent threat (APT) group looking to lure fans with leaked episodes.
Some cybercriminals still aren't taking precautions to ensure they evade capture in the event of another major sting operation making law enforcement's job easier.
In Case you missed it: Dodgy Google play apps again; Linkedin hit; NHS database breach; GPS spoofing US navy?; board training lacking
Symantec researchers have spotted mobile malware factories in the wild which allow wannabe malware authors develop custom malware on their own devices without having to write a single line of code.
U.S. officials arrested a Chinese national who is accused of being involved in the 2015 OPM breach.
Kaspersky Lab researcher Roman Unuchek spotted an uptick in WAP-billing trojan-clickers from different cybercriminal groups targeting users in Russia and India.
A Russian-born Canadian citizen pled not guilty after being accused for playing a role in the 2014 Yahoo hack which compromised the information of nearly 500 million users.
The threat actors who two weeks ago targeted Mandiant are now claiming to have leaked FireEye documents in a second leak.
The infamous Guccifer is trying to avoid extradition to the U.S. and told reporters he feels the U.S. State Department is behind the Guccifer 2.0 hacks.