Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
According to researchers, the fileless attack uses PCASTLE to distribute samples of XMRig, a well-known Monero-mining malware family.
Researchers spotted a phishing campaign delivering a multi-feature, open-source remote administration tool known as Babylon RAT.
Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
A new variant of the Emotet banking malware is using compromised connected devices as first-layer command-and-control (C&C) servers.
A threat actor known as TA505 recently launched a phishing campaign that uses living-of-the-land binaries (LOLBins) to distribute a new backdoor malware.
Researchers detected a new Android Trojan called Gustuff that is capable of targeting more than 100 mobile banking apps.
Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.