Developers of the Android banking malware Marcher are now disguising the trojan as an Adobe Flash Player update, the cloud security company Zscaler has reported in a Thursday blog post.
The trail of a spate of cyberespionage campaigns have lead Trend Micro researchers to believe to one group dubbed BlackTech.
Claiming that it's got the Fireball malware threat under control, Microsoft is asserting on a company blog that the "reported magnitude of its reach might have been overblown."
The top three malware families in May impacted a quarter of the globe's organizations with zero-day attacks, according to Check Point's latest Global Threat Impact Index.
Buckle Inc. was hit with point-of-sale malware on the payment data systems at an undisclosed number of locations.
The six bought services created by an unidentified German man who was arrested in April 2016.
The security firm Centrify has partnered with Bugcrowd to roll out a public bug bounty program.
FIN7 is back at it again this time using their infamous fileless malware to target U.S. restaurants.
Trend Micro researchers spotted more than 800 Android applications available on the Google Play.
A lack of proper endpoint security could be costing enterprises an average of $6 million a year, according to a recent survey.
Security researchers have been examining malware samples that can knock off power, similar to what was done to the residents of Kiev in December 2016.
U.S. Securities and Exchange Commission (SEC) co-directors of enforcement, Stephanie Avakian and Steven Peikin, both acknowledged cybercrime as the biggest market threat.
While the LatentBot trojan has been around since 2013, Malwarebytes researchers warn the bot has grown rich in features.
Dr. Web researchers spotted a trojan dubbed Linux.MulDrop.14 exclusively targeting the mini computers to mine an unnamed cryptocurrencies.
Kaspersky Lab recently filed antitrust complaints against Microsoft to both the European Commission and German Federal Cartel Office.
A new rooting malware not only downloads its modules onto targeted systems, but also injects malicious code into the systems' runtime libraries.
An analysis of roughly 4,400 IP cameras in the U.S. using custom http servers found that just over 51 percent of them are infected by one of four Internet of Things botnet malware families, according to new research.
Although there's been a drop in the activity of exploit kits, threat actors have adapted by redirecting unwitting victims to exploit kit servers.
New York drivers are being targeted in a phishing scam where an email they receive warns they have 48 hours to pay a fine or have their driver's license revoked.
Leaked transcripts of a phone conversation between President Donald Trump and Philippine President Rodrigo Duterte linked to APT32.
The on-going whodunnit regarding cyberattacks on European financial firms through the SWIFT bank messaging services now has the Russian cybersecurity firm Group IB alleging North Korea is behind the attacks.
Detecting 64-bit malware is more difficult than signature scanning for 32-bit malware, and despite a slow start cyber-criminals are starting to update their tools.
In an effort to see what happens after a data breach, the Federal Trade Commission leaked a database of 100 fake customers.
Researchers at Trend Micro found themselves the victims of a "Rickrolling" while analyzing a malware program that triggered multiple rules-based security alerts, most likely deliberately.
Cybercriminals have brought back an older attack vector using LNK files to execute PowerShell scripts to download malware.