IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Cybercrime tools available through private networks and on the Dark Web make it easier than ever for would-be fraudsters to infiltrate networks.
Fatboy ransomware recently added location-based pricing along with extra service for cybercriminals looking for ransomware-as-a-service.
A remote access Trojan remained undetected for several years due to its unconventional operating methods. Here's what to know about the Cardinal RAT.
Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
Iot devices are now under threat from a new strain of malware. BrickerBot infects vulnerable Linus-based endpoints and makes them permanently unusable.
The IBM X-Force team analyzed the Andromeda malware and determined that its operators have shifted their attention to the payment card industry.
A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.