Malwarebytes has closely examined a relatively new fake update scam that uses a combination of legitimate websites, a real cloud storage site and excellent social engineering to pass along either a banking Trojan and remote access tool to its victims.
It should come as no surprise to anyone in the cybersecurity industry that cryptocurrency mining is increasing at an incredible rate, but the rate of increase might come as a surprise.
Malicious actors managed to foil Google's Play Protect app vetting process and place numerous malicious apps into the store Sophos Labs by having them lay doggo before finally activating and bombarding the victim with unwanted ads.
A Latvian national who at one point was the fifth most wanted cybercriminal in the U.S. pleaded guilty this week in federal court to supporting a scareware scheme targeting users of the Minneapolis Star Tribune's website.
Cybercriminals are exploiting traditional measures of trust to gain a foothold on users systems by compromising trusted sites.
A malvertising campaign was observed exploiting Google's DoubleClick network to deliver silent cryptominers on high-traffic sites.
Cybercrimals attempting to take advantage of Twitter users curiosity over who visits their page are using a new form of bait that advertises the ability to track such visits.
A massive malvertising operation bought an estimated 1 billion ad views in 2017 under the guise of 28 different fake ad agencies, in what a new report is calling the largest operation of its kind last year.
A phony and malicious application imitating the Telegram app made its way into the Google Play Store posing as a newer updated version of the popular messaging app.
Malwarebytes researcher Jerome Segura analyzed a RIG exploit campaign distributing malware coin miners.
Trend Micro researchers spotted two ATM malware families which raise concern of what's to come.
Cybercriminals using the Terror exploit kit have recently starting using SSL certificates to help sneak the EK and its malware passed cybersecurity staffers.
Forces of the dark side are hijacking send-to-a-friend (a.k.a. share-with-a-friend) social sharing modules to send random Star Wars quotes and malicious links.
Matrix ransomware is now being distributed via the RIG exploit kit on various sites displaying malvertising.
Kovter Group malvertising campaign put millions at risk of ad fraud malware infections. Fake browser updates hoodwink users into installing malware.
Native ad and content provider Taboola is being abused by tech support scammers to serve malvertising.
Even with increased awareness and the availability of patches, the vulnerabilities are unlikely to disappear soon, researchers said.
Beijing officials arrested 11 individuals linked to the Fireball malware after receiving a tip from someone operating under the pseudonym "Zhang Ming."
A year-old malvertising campaign has helped researchers uncover a new exploit kit (EK) called Sundown-Pirate that is being used to deliver a plethora of malware types.
A new variant CryptoMix ransomware is appending the .EXTE extension to the names of the folders it captures.
Malwarebytes researchers spot a stolen version of the DMA Locker ransomware exploiting users via weakly protected Remote Desktop.
Malwarebytes researchers spotted an uptick in United States Postal Service (USPS) themed malspam delivering one of three banking trojans.
Researchers spotted a backdoor trojan that uses torrents as a delivery medium and uses distributed brute force attacks.
Checkpoint researchers spotted a malware, dubbed Skimmer, in the Google Play store which uses a unique and innovative tactics evade detection.
Cybersecurity concerns hit the big time in 2016.
Malwarebytes researchers spotted a clickjacking campaign abusing Google AdSense and avoiding ad fraud bots.
The old adage that crime does not pay is not only applicable those cybercriminals who are caught, but also to many of the victims of the Gatak Trojan who download it while attempting to gain access to pirated software.