A recently discovered malvertising campaign known as Stegano uses steganography and other techniques that researchers have observed in similar attacks.
The recently discovered CryptoLuck ransomware is distributed by the RIG-E exploit kit, suggesting that it may target a large pool of victims.
With heavyweight exploit kits like Nuclear, Angler and Neutrino out of the picture, the Sundown exploit kit appears poised for growth in the near future.
According to the most recent Proofpoint threat report, nearly 97 percent of malicious emails observed in Q3 2016 contained Locky ransomware.
The RIG exploit kit appears to be the new guy on the cybercrime block, and it’s stepping up to void left by older, fledgling kits. Anti-malware firm Malwarebytes noted the sharp drop for the Angler exploit kit in June. An alleged major...
A new proof of concept (PoC) for a previously patched Internet Explorer vulnerability has made its way into the Neutrino exploit kit.
Now that both Angler and the Nuclear EK have been shut down, cybercriminals will have to search for a replacement to carry out their attacks.
The Angler exploit kit appears to have been shut down, but cybercriminals are turning to the Neutrino EK to fill the gap left behind.
A new Locky variant has made enough changes to avoid detection by some cybersecurity tools and fool users into becoming victims.
Researchers recently discovered a possible solution for a Radamant ransomware variant. Here's what you need to know about this threat.