A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.
In a recent phishing campaign, fraudsters used a legitimate browser extension tool called SingleFile to obfuscate their attacks and remain undetected.
Security researchers discovered a hidden HTTP directory that is allowing threat actors to install Shade ransomware on WordPress and Joomla websites.
Researchers detected a new Android Trojan called Gustuff that is capable of targeting more than 100 mobile banking apps.
A massive brute-force attack campaign used both legacy protocols and credential dumps to compromise cloud user accounts, according to security researchers.
Security researchers discovered that attackers are using fake copyright infringement notifications as part of a recent Instagram hacking campaign.
Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.
Security researchers discovered a new fileless malware strain targeting bank customers in Brazil and Thailand with a hack tool and at least two infostealers.
Security researchers spotted a new attack campaign that's targeting organizations in several countries with a new variant of Qbot banking malware.