Security researchers discovered a strain of POS malware dubbed GlitchPOS that comes with an instructional video to help would-be cybercriminals steal credit card data.
In 2018, IBM X-Force researchers observed organized cybercrime groups collaborating, rather than competing over turf or even attacking each other, for the first time.
EdTech today stores more personally identifiable information on K-12 students than ever, but the FBI warns that much of that data is severely exposed to threat actors.
The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.
A malware family known as CARROTBAT is currently using at least 12 unique decoy documents to spread itself among unsuspecting users.
Security researchers observed the Sednit threat group distributing Zebrocy malware using a Delphi dropper and mail downloader.
Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
The Sofacy group recently targeted several government organizations around the world with the new Cannon Trojan.
Researchers observed the TA505 threat group spreading a previously undocumented remote access Trojan (RAT) called tRaT.
A ransomware-as-a-service program called FilesLocker offers affiliates commissions of up to 75 percent on all revenue stolen from victims.