Written By David Bisson

Researchers Observe Threat Actor Using Varied Tools and Payloads to Distribute Monero Miners

Researchers observed a new threat actor known as Rocke leveraging a varied tool kit and multiple payloads to distribute cryptomining malware, including Monero miners.

60 Percent of Targeted Email Attacks Aimed at Contributors and Lower Management

A new report revealed that 60 percent of targeted email attacks were aimed at individual contributors and lower-level management between April and June 2018.

More Than a Quarter of Executives View Security Investments as Having a Negative ROI

A new report found that more than one-quarter of business executives view security investments as having a negative return on investment (ROI).

New BondPath Android Spyware Retrieves Chat Data From Messaging Apps

A new Android spyware family is capable of retrieving chats from several mobile messaging apps and stealing on other types of information, such as browser history and call logs.

Spammers Target Financial Institutions With IQY Files That Conceal New Downloader Malware

Spammers are targeting financial institutions using Excel Web Query (IQY) files that conceal a new downloader malware, according to security researchers.

New Ransomware Family Appends ‘.Armage’ to Encrypted Files

Researchers from Quick Heal Security Labs discovered a new family of ransomware that spreads via spam emails and appends the extension ".Armage" to all files it encrypts.

Malicious Email Payloads Increased in Volume and Diversity in Q2 2018

A quarterly threat report revealed that malicious email attacks increased by 36 percent and delivered more diverse payloads in Q2 2018.

Modular Remote Access Trojan Uses Sophisticated Techniques to Evade Detection

According to security researchers, a new modular remote access Trojan (RAT) is using several sophisticated techniques to fly under the radar of traditional detection solutions.

Fileless Malware CactusTorch Executes Harmful .NET Assemblies From Memory

Security researchers observed CactusTorch, a fileless malware, using a .NET executable to run harmful .NET assemblies from memory.

Bitcoin Stealer Malware Takes $60K Using Clipboard Modification Method

Cybercriminals used malware to steal approximately $60,000 in bitcoin using a technique that modifies an infected machine's clipboard content.