Our prediction at the end of 2016 held true: The influx of advanced DDoS, POS and other attacks targeting the financial sector has yet to abate in 2017.
Cybercrime tools available through private networks and on the Dark Web make it easier than ever for would-be fraudsters to infiltrate networks.
The state of government IT was a central issue during last year's election and continues to drive decision-making within Trump's administration.
In the age of cyber warfare, security analysts must determine which assets are most critical and prioritize their defense strategies accordingly.
According to the 2017 IBM X-Force Threat Intelligence Index, cybercriminals targeted the financial services sector more than any other industry in 2016.
Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.
After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.
Cybercriminals are steeped in a culture of trading malicious tools. This Dark Web marketplace drives the evolution of the cyberthreat landscape.