
The TrickBot authors continue to target various financial institutions across the world, using MS17-010 exploits in an attempt to successfully laterally move throughout a victim’s network…

Phorpiex as a malware family has been around for several years and hasn’t changed much in purpose, functionality, or code…

Cyber criminals are targeting victims with a two-pronged attack that secretly infiltrates systems with data-stealing malware, before dropping ransomware onto the infected system.

Malware threats come without warning and can wreak havoc on an environment. If a user’s device or information is compromised, he or she may have to wait for IT to rectify the issue. Part of the waiting process is determining which type of threat is causing harm.

Android.Banker.L — combines the functionality of banking Trojans, keyloggers and ransomware to compromise victim devices and steal data. As reported by Quick Heal, the latest…

We manage so many of our daily activities online that the web has inevitably turned into a giant pool of personal data, which is exposed to a variety of risks, as was the recent case with Facebook.

Meltdown and Spectre are beyond the norm, however, because they allow exploits at the hardware level, the silicon in your machine. That makes fixing the problem much more challenging

keylogger – a program that sends typed characters to an attacker. The keylogger is deactivated by default but could represent a privacy concern if an attacker has physical access to the computer.

Regardless of the level of your technical control, its the importance of developing a response plan that really matters. Many companies don’t have a plan, particularly midmarket organizations that pay little attention to security.

In a camera-ready twist, the demand for ransom actually did come in the form of an analog note. Users were instructed to turn on their printers, which promptly spat out a demand for a “licensing fee” of $189 to be paid …