The Trickbot banking trojan has a couple of new tricks up its sleeve: leveraging the Necurs botnet to spread via spam emails, while expanding its webinject capabilities in order to victimize customers of U.S. banks.
Companies are likely to be closed down by swinging EU penalty fines next year given the failure of the C-Suite to prepare for GDPR despite rising breaches in the retail sector.
Insurance companies could be underestimating the potential devastation major cyber-attacks may cause.
A recent study found breaches also temporarily hurt a company's stock market status as well.
Kaspersky further reported that 60 percent of NotPetya infections took place in Ukraine, while Russia experienced just over 30 percent.
NotPetya and WannaCry may have grabbed headlines over the last few months, but ESET points out in a recent report that the Ukraine has been under siege for months by a group dubbed TeleBots that has run a series of damaging attacks against that country.
The Armada Collective hacking group has issued a $315,000 ransom demand to seven South Korean banks, after threatening to launch distributed denial of service attacks against each of their organizations.
Developers of the Android banking malware Marcher are now disguising the trojan as an Adobe Flash Player update, the cloud security company Zscaler has reported in a Thursday blog post.
An annual audit of more than 1,000 top websites found that 52 percent have highly trustworthy cybersecurity and privacy practices, yet 46 percent failed the assessment altogether, with bank sites surprisingly faring worst of all.
A lack of proper endpoint security could be costing enterprises an average of $6 million a year, according to a recent survey.
Ransomware users could be making a lot more money, according to a new report from the University of Kent.
Chipotle reported a breach which affected more than 2,000 restaurant locations and an undisclosed number of individuals across 47 states.
In an effort to see what happens after a data breach, the Federal Trade Commission leaked a database of 100 fake customers.
The Shadow Brokers group that has been leaking alleged NSA hacking tools, is now threatening to launch a "Dump of the Month" service that will deliver more stolen tools and data to paying subscribers.
Three Chinese hackers were ordered by a Federal Judge in Manhattan to pay a combined total of approximately $9 million in fines.
Two recent cybertheft campaigns targeting South Koreans employed a three-stage downloader framework that installed the Blackmoon banking trojan on geo-targeted machines, according to a report Thursday from Fidelis.
A zero-day bug in Microsoft Office and WordPad that hackers exploited to spy on targeted users, implant malware, and steal banking credentials took nine months to fix, according to news reports.
Investigators from seven Southeast Asian nations collaborated on a joint Interpol operation that identified approximately 8,800 C2 servers in eight countries and nearly 270 compromised websites, including government portals.
A recently discovered malvertising campaign called Binary Options is redirecting Internet users to a fake trading company webpage, before infecting some of these victims with a banking trojan via the RIG exploit kit.
Three New York-area men have separately pleaded guilty in federal court to one count of conspiracy to commit bank fraud, in relation to the theft of at least $428,581 in funds from various New Jersey banking locations.
Malwarebytes researchers spotted an uptick in United States Postal Service (USPS) themed malspam delivering one of three banking trojans.
Hackers launched an attack against Union Bank of India that was very similar to the attack Bangladesh bank heist that resulted in the theft of $81 million.
Kaspersky Lab on Tuesday revealed further details about a memory-only "fileless malware" campaign that a cybercriminal organization has been employing to steal money remotely from ATMs while leaving behind virtually no trace of malicious activity.