A malvertising campaign is redirecting users to the RIG exploit kit, which then attempts to infect them with a new ransomware called Buran.
Recent variants of Sodinokibi accounted for scaling issues as the ransomware family steadily moves to target large enterprises.
Researchers have spotted a malvertising campaign that is delivering two payloads to victims: the Vidar information stealer and GandCrab ransomware.
The creators of a ransomware-as-a-service threat dubbed Princess Evolution are looking for affiliates to spread the Rig exploit kit in exchange for 60 percent of what's stolen.
New ransomware attacks from GandCrab suggest that the authors are moving quickly to improve its ability to evade detection and impede analysis by security researchers.
According to security researchers, the Emotet Trojan is not only still active but has become more sophisticated and persistent in the four years since its initial discovery.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
According to a recent study, malicious actors and threat groups are generating, spending and reinvesting $1.5 trillion worth of cybercrime profits.
The rate of ransomware is rising, largely due to the availability of exploit kits and ransomware-as-a-service (RaaS) packages in underground marketplaces.
Threat actors are reviving exploit kits to deliver cryptocurrency miners through malvertising campaigns. The Neptune exploit kit mines for Monero.