The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.
A ransomware-as-a-service program called FilesLocker offers affiliates commissions of up to 75 percent on all revenue stolen from victims.
Using a virtual private network (VPN) to obfuscate your location and encrypt data is a powerful way to boost data privacy and prevent the tracking, stalking and theft of personal information.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Researchers believe that a new APT group known as GreyEnergy, which they observed targeting ICS consoles across Poland and Ukraine, may be a successor to BlackEnergy, the group that authored NotPetya.
A new version of GandCrab, another malware security warning. This iteration uses NTCrypt to facilitate code obfuscation and hook more potential victims.
Researchers observed the Viro botnet spreading spam, spying on users' keystrokes and distributing ransom notes written in French to victims in the U.S.
As data becomes more fluid, dynamic and distributed, so do the challenges around protecting it. Unlike traditional data stores, there is little to no control of unstructured data.
When it comes to cloud data protection, it's not just credit card numbers that need protecting, it's also the data that represents a majority of your company's value: your intellectual property.
Researchers from Quick Heal Security Labs discovered a new family of ransomware that spreads via spam emails and appends the extension ".Armage" to all files it encrypts.