The SHELLBIND Trojan exploits a recently patched Samba vulnerability to steal data from connected network-attached storage (NAS) devices.
The Sphinx Trojan is based on the source code of the infamous Zeus banking Trojan. First seen around August 2015, Sphinx has been upgraded with a new method of randomizing the domain names it uses for the command-and-control (C&C) servers to...
Concealed C&C servers make it even more difficult for researchers to track down data dumps and stolen information repositories.
According to IBM Trusteer researchers, there is a new type of Citadel malware that is compromising password management and authentication solutions.
With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
IBM Security Trusteer researchers recently discovered a new Tinba variant exhibiting new, exciting features and making waves in an active malware campaign.
As point-of-sale malwares continue to crop up, it is important to maintain the security of these systems to protect them.
Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.
When systems are infected, it is important to apply additional post-infection controls that prevent malware from compromising the endpoint.