Researchers discovered a new variant of the Emotet Trojan that spreads across internal networks and serves as a downloader for other banking Trojans.
The botnet malware known as Ragebot, which notably uses IRC to control infected devices, has resurfaced with improved features.
A team of researchers exposed gaps in booking systems security at a recent conference in Germany and encouraged GDS providers to upgrade their systems.
Trojan-laden malware remains a huge problem for enterprises and individual users alike. As noted by Palo Alto Networks, some cybercriminals are targeting users with creative Mac OS X malware that uses a PDF detailing Russian space program projects...
The Kerio Control information appliance, usually known as Kerio Firewalls, can be attacked and the internal controls bypassed, according to SEC Consult. The device is designed by Kerio Technologies to be used as a network firewall, router or VPN...
Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
Onapsis discovered multiple new vulnerabilities affecting the SAP HANA and SAP TREX applications, including critical and high-risk security flaws.
Organizations with weak security posture are an attractive target for cybercriminals, and they may find themselves coming under fire frequently.
New security research from Akamai found that brute-force attacks are making a comeback thanks to their low-risk, high-reward nature.
Remote desktop servers are vulnerable to brute-force attacks, and as a result, they may allow ransomware to enter a corporate network.