Written By Shane Schick

Cybersecurity Spending Poised to Rise in 2018, Gartner Reports

According to Gartner, cybersecurity spending will reach an all-time high next year as enterprises try to maintain compliance and protect their data.

Vortex and Bugware Ransomware Use Open Source Tools to Target .NET Users

Security researchers uncovered two new ransomware strains that use open source tools to minimize their victims' odds of recovering their encrypted files.

US Bill Threatens Jail Time for Failing to Disclose a Data Breach Within 30 Days

A bill proposed by members of the U.S. Senate would mandate jail time for business leaders who fail to disclose a data breach in a timely manner.

Fraudsters Use Necurs Botnet to Spread Scarab Ransomware

A group of cybercriminals used the Necurs botnet to spread Scarab ransomware to 12.5 million email accounts on Nov. 23, according to security researchers.

Cybercriminals Cash In on Compromised ATM Security, Researchers Warn

Researchers revealed how easily ATM security can be thwarted by breaking into a machine and then using malware to take down an entire network.

Toast Overlay Attacks Prompt Malware Removal for Android Users

An overlay attack involving Android's Toast feature may mean users have to deal with malware removal issues.

Study of More Than 3,200 Unique Phishing Kits Shows Fraudsters’ Inner Workings

Malicious developers commonly distribute phishing kits with built-in back doors that enable them to hijack victims infected by other threat actors.

Catch-All Google Chrome Extension Conducts Wide-Ranging Data Theft

A malicious Google Chrome extension dubbed Catch-All is using a simple phishing scheme to commit data theft against users in Brazil.

DUHK Vulnerability Offers a Quick Way to Launch a Crypto Attack

Security researchers exposed a vulnerability in a random number generator with hardcoded keys that could lead to a crypto attack.

Locky Ransomware Attacks Exploit Microsoft DDE to Increase Effectiveness

The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.