A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
I will never watch "The Little Mermaid" again without thinking about ransomware and cyberattacks.
Despite the rise in vulnerability reporting, cryptojacking attacks and attacks on critical infrastructure, one threat trend has been on the decline.
Security researchers said they fended off a DDoS attack in January of more than 500 million packets per second, which might constitute the largest of its kind ever publicly disclosed.
According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.
As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.
By understanding the basics of DNS analytics, the common methods of attack and the tools available to security teams, you will be better prepared to protect your enterprise from hidden cyberthreats.
Researchers discovered a family of bots dubbed Chalubo launching distributed denial-of-service (DDoS) attacks to brute-force Linux-based systems running internet-facing SSH servers.
When the machine learning technology cyber defenders use to stop DDoS attacks inevitably falls into the hands of malicious actors, which side will win?