In an operation crowned "unprecedented," Europol and the DOJ joined forces and successfully dismantled what was left of the GozNym cybercrime gang that attempted to steal well over $100 million.
The Retefe banking Trojan has resumed its activity with a new series of attack campaigns that leverage Smoke Loader as an intermediate loader.
A new variant of the Emotet banking malware is using compromised connected devices as first-layer command-and-control (C&C) servers.
Researchers observed variants of the Emotet Trojan injecting themselves into existing email conversations as a means of distributing malicious links.
Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
A remote overlay malware that is attacking Latin American banks met its match in a solution built from behavioral biometrics, deep research, reverse engineering and finely tuned threat modeling.
Mobile malware is nothing new. But in recent months, attackers have been getting more creative and resourceful with how they conceal, distribute and deploy these threats.
IBM X-Force analyzed modifications made to IcedID that help the banking Trojan act more stealthily on infected devices.
Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.
Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware.