According to security researchers, the Emotet Trojan is not only still active but has become more sophisticated and persistent in the four years since its initial discovery.
Australian businesses have been targeted in a phishing campaign that uses FTP links to deliver the DanaBot banking Trojan, which is designed to steal financial information and other private data.
An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis.
IBM X-Force Research has uncovered a new Brazilian, Delphi-based malware active in the wild in a recent campaign dubbed MnuBot.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.
Would-be threat actors who lack technical skills can take advantage of cybercrime-as-a-service offerings that facilitate DDoS and other attacks for as little as $10.
Last month's cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials' identity protection habits and more.