X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
According to a new report, a team of researchers created proof-of-concept malware that poses a serious threat to SCADA and ICS systems.
X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.
Threat actors with apparent ties to the Lazarus cybergang launched an attack against Polish banks that may be part of a broader, global campaign.
Security researchers discovered a Windows Trojan that spreads Mirai malware, identifies potential victims and provides an extra boost of processing power.
The rate of malvertising attacks increased by 132 percent in 2016, according to a recent report. The use of ad-blocking software also increased sharply.
Polymorphic malware may be a serious threat, but some of the strategies used to create it could be applied to malware defenses, as well.
The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
While network-based security solutions provide protection for an enterprise's network, endpoint protection is needed to effectively combat advanced malware