Researchers observed the TA505 threat group spreading a previously undocumented remote access Trojan (RAT) called tRaT.
A ransomware-as-a-service program called FilesLocker offers affiliates commissions of up to 75 percent on all revenue stolen from victims.
Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.
Researchers reported that threat actors are using web services such as Google Drive, SharePoint and Dropbox to host files containing malicious links as part of phishing campaigns.
Security researchers observed threat actors using a Delphi packer to shield their binaries from malware classification by antivirus and other detection tools.
Security researchers observed the threat group Cobalt Gang using a downloader known as CobInt to infect and subsequently install additional malware on systems of interest.
Even after a successful attack, security teams can still minimize the financial and reputational damage associated with a breach by following the IBM X-Force cyberattack framework.
An attacker who gains access won't necessarily walk away with an organization's proprietary data. Here's how a cyberattack framework can help you subvert an attacker already in a network.
According to a new report, threat actors are targeting enterprise resource planning (ERP) applications like SAP — and, in some cases, are exploiting a vulnerability that was disclosed in 2016.
According to a recent threat advisory, cybercriminals have combined a new encrypted downloader with old-school macro malware to gain backdoor access to victims' machines.