Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.
A cybergang known as FIN7 has been using OLE command files to spread its malware and identify potential victims for additional phishing attacks.
A cyberattack by the author of BrickerBot left 60,000 users without internet in India. The attack was linked to an external connections vulnerability.
A new report detailed how Adwind, a remote access tool, is surging in popularity and putting countless users at risk for cyberattack.
Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.
Since June 27, IBM has been actively engaged in response and remediation efforts across our clients, services and products resulting from the new Petya variant. Although primarily focused in Ukraine, this attack produced global effects and left...
Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
The idea of employing basic endpoint hygiene to keep your data safe seems like a no-brainer. So why was the WannaCry ransomware attack so damaging?
RoughTed, a malvertising scheme that bypasses ad blockers and delivers poisoned ads through redirections, has been active for over a year.
The best strategy to defend against the WannaCry ransomware attack and similar events is to adopt tools to prevent them from occurring in the first place.