A massive brute-force attack campaign used both legacy protocols and credential dumps to compromise cloud user accounts, according to security researchers.
Researchers discovered new Trojan malware written in Golang that's targeting e-commerce websites with brute-force attacks.
Security researchers discovered a new variant of Mirai malware known as Miori that is targeting internet of things (IoT) devices to integrate into a larger botnet.
Researchers discovered a new variant of the Emotet Trojan that spreads across internal networks and serves as a downloader for other banking Trojans.
The botnet malware known as Ragebot, which notably uses IRC to control infected devices, has resurfaced with improved features.
A team of researchers exposed gaps in booking systems security at a recent conference in Germany and encouraged GDS providers to upgrade their systems.
Trojan-laden malware remains a huge problem for enterprises and individual users alike. As noted by Palo Alto Networks, some cybercriminals are targeting users with creative Mac OS X malware that uses a PDF detailing Russian space program projects...
The Kerio Control information appliance, usually known as Kerio Firewalls, can be attacked and the internal controls bypassed, according to SEC Consult. The device is designed by Kerio Technologies to be used as a network firewall, router or VPN...
Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
Onapsis discovered multiple new vulnerabilities affecting the SAP HANA and SAP TREX applications, including critical and high-risk security flaws.