Cylance researchers said the discovery's significance far outweighs its size, given that core router compromises are considerably harder to detect, analyze, patch, and remediate than compromises of PCs.
The aggressive Russian APT group Sofacy targeted yet another European government agency earlier this month, attempting to infect the organization with unknown malware using a crafty new variant of its Adobe Flash-based exploit platform DealersChoice.
Malware active in South Korea, redirects calls to scammers. Security researchers have discovered a new variant of the Fakebank malware.
The suspected Chinese cyberespionage group dubbed "TEMP.Periscope" is targeting U.S. engineering and maritime Industries in its latest campaign.
Prilex, a point-of-sale malware program that's historically been used to steal money or payment card information Brazilian ATMs and retailers, has now evolved into a comprehensive tool suite that lets cybercriminals steal chip and PIN card data and create their own functioning, fraudulent plastic cards.
Intel is redesigning its chips in order to combat Spectre and Meltdown attacks, also known as Project Zero Variant 1, 2, and 3.
Kroll Cyber Security has detected a small footprint Point of sale malware called PinkKite that is currently active in the wild.
Bitcoin stealing malware that swaps user accounts with that of the attacker was hosted on Download.com servers for nearly a year.
Security researchers have uncovered how deep packet inspection middleboxes are being used either to expose Turkish nationals to nation-state spyware or to redirect Egyptian Internet users to ads and browser cryptocurrency.
A new Android malware family dubbed HenBox is targeting a large online population based in China who have been the subject of numerous cyber-attacks in the past.
Anti-malware security vendors have warned that Mac malware is on the rise, and that the perception of Macs as being completely 'safe' is misleading.
The Hacking Team is back to developing spyware as previously unreported samples of its infamous surveillance RCS tool were reportedly spotted in the wild.
Like any other major sporting event that draws millions of viewers, March Madness will attract bad actors trying steal money and wreak havoc.
A cyber espionage campaign bearing all of the hallmarks of an extremely advanced nation-state actor used malware to spy on international targets for six years before it was finally detected and exposed, Kaspersky Lab reported on Friday.
The hackers who injected malicious code into a version of computer maintenance app CCleaner last year may have been preparing to deliver third-stage malware to at least a select few of the 2.27 million computers that had downloaded the tainted utility program.
A newly discovered and unusually sophisticated cryptojacking attack attempts to install cryptominers on both database and application servers by targeting misconfigured Redis servers, as well as Windows servers that are susceptible to the EternalBlue NSA exploit.
After monitoring the malware distributor for the past six months, Talos said in a blog post that Gozi ISFB remains active in 2018 leveraging a wider distribution surface in attack recent campaigns.
Researchers have discovered a new malware that steals cryptocurrency and other electronic funds by surreptitiously modifying wallet or payment information whenever victims copy it to their devices' clipboards.
Malwarebytes researchers spotted an updated version of the Avzhan DDoS bot dropped by Chinese drive-by attack.
A previously unrecorded threat has been uncovered that has 53 still operating apps distributing RedDrop malware which can exfiltrate a wide range of data from a victim's mobile device.
A drive-by download campaign is targeting Chinese websites to experiment with different exploits to drop malware.
Cybercriminals are using social media and social engineering to dupe victims into downloading Advance Persistent Threat spyware disguised as the Kik messenger app.
An easy-to-exploit bug has left Tinder accounts and private chats exposed to hackers, revealed a researcher this week.
A newly discovered variant of Mirai botnet malware forces infected devices to act as proxy servers capable of protecting the anonymity of cybercriminals engaging in illegal activities.
The University of Virginia Health System is letting almost 2,000 patients know that their health records may have been exposed when an unauthorized third party gained access to a computer several years ago.