The Outlaw threat group is using a botnet to distribute a Monero cryptocurrency miner and a Perl-based backdoor component.
A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
A new threat called HiddenWasp is different from other Linux malware in that it's focused solely on achieving targeted remote control of infected hosts.
IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.
A DDoS botnet targeting servers used by the Electrum bitcoin wallet reached 152,000 infected hosts at the end of April.
Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
Researchers spotted a new Mirai variant targeting presentation systems and display devices commonly used by businesses.
As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
Researchers discovered Geodo botnets using a new spam campaign to deliver samples of Qakbot malware.
An analysis of more than 4.4 million malware samples showed botnets were responsible for crypto-mining at least 4.3 percent of Monero over a 12-year period.