The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.
A malware family known as CARROTBAT is currently using at least 12 unique decoy documents to spread itself among unsuspecting users.
Security researchers observed the Sednit threat group distributing Zebrocy malware using a Delphi dropper and mail downloader.
Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
The Sofacy group recently targeted several government organizations around the world with the new Cannon Trojan.
Researchers observed the TA505 threat group spreading a previously undocumented remote access Trojan (RAT) called tRaT.
A ransomware-as-a-service program called FilesLocker offers affiliates commissions of up to 75 percent on all revenue stolen from victims.
Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.
Researchers reported that threat actors are using web services such as Google Drive, SharePoint and Dropbox to host files containing malicious links as part of phishing campaigns.
Security researchers observed threat actors using a Delphi packer to shield their binaries from malware classification by antivirus and other detection tools.