Researchers have spotted a malvertising campaign that is delivering two payloads to victims: the Vidar information stealer and GandCrab ransomware.
Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.
Several major U.S. newspapers reported they were victims of production-disrupting cyberattacks that apparently involved Ryuk ransomware.
There is no single answer to the question of how to best use data encryption. Depending on their application and data types, organizations will likely need to apply different architectural patterns.
In 2017 and 2018, threat actors used a toolkit called KoffeyMaker in multiple black box ATM attacks targeting Eastern European financial institutions.
The Marriott data breach could impact the personal information of approximately 500 million guests, including payment card data for about 327 million customers.
In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks?
Organizations that act now to upgrade to quantum-safe cryptography will be better positioned to reap the benefits of this emerging technology in the coming decades.
A watering hole campaign that has been active in Southeast Asia since September has compromised at least 21 websites, including government and media domains.
The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.