A phony and malicious application imitating the Telegram app made its way into the Google Play Store posing as a newer updated version of the popular messaging app.
Malwarebytes researcher Jerome Segura analyzed a RIG exploit campaign distributing malware coin miners.
Trend Micro researchers spotted two ATM malware families which raise concern of what's to come.
Cybercriminals using the Terror exploit kit have recently starting using SSL certificates to help sneak the EK and its malware passed cybersecurity staffers.
Forces of the dark side are hijacking send-to-a-friend (a.k.a. share-with-a-friend) social sharing modules to send random Star Wars quotes and malicious links.
Matrix ransomware is now being distributed via the RIG exploit kit on various sites displaying malvertising.
Kovter Group malvertising campaign put millions at risk of ad fraud malware infections. Fake browser updates hoodwink users into installing malware.
Native ad and content provider Taboola is being abused by tech support scammers to serve malvertising.
Even with increased awareness and the availability of patches, the vulnerabilities are unlikely to disappear soon, researchers said.
Beijing officials arrested 11 individuals linked to the Fireball malware after receiving a tip from someone operating under the pseudonym "Zhang Ming."
A year-old malvertising campaign has helped researchers uncover a new exploit kit (EK) called Sundown-Pirate that is being used to deliver a plethora of malware types.
A new variant CryptoMix ransomware is appending the .EXTE extension to the names of the folders it captures.
Malwarebytes researchers spot a stolen version of the DMA Locker ransomware exploiting users via weakly protected Remote Desktop.
Malwarebytes researchers spotted an uptick in United States Postal Service (USPS) themed malspam delivering one of three banking trojans.
Researchers spotted a backdoor trojan that uses torrents as a delivery medium and uses distributed brute force attacks.
Checkpoint researchers spotted a malware, dubbed Skimmer, in the Google Play store which uses a unique and innovative tactics evade detection.
Cybersecurity concerns hit the big time in 2016.
Malwarebytes researchers spotted a clickjacking campaign abusing Google AdSense and avoiding ad fraud bots.
The old adage that crime does not pay is not only applicable those cybercriminals who are caught, but also to many of the victims of the Gatak Trojan who download it while attempting to gain access to pirated software.