According to the most recent Proofpoint threat report, nearly 97 percent of malicious emails observed in Q3 2016 contained Locky ransomware.
The RIG exploit kit appears to be the new guy on the cybercrime block, and it’s stepping up to void left by older, fledgling kits. Anti-malware firm Malwarebytes noted the sharp drop for the Angler exploit kit in June. An alleged major...
A new proof of concept (PoC) for a previously patched Internet Explorer vulnerability has made its way into the Neutrino exploit kit.
Now that both Angler and the Nuclear EK have been shut down, cybercriminals will have to search for a replacement to carry out their attacks.
The Angler exploit kit appears to have been shut down, but cybercriminals are turning to the Neutrino EK to fill the gap left behind.
A new Locky variant has made enough changes to avoid detection by some cybersecurity tools and fool users into becoming victims.
Researchers recently discovered a possible solution for a Radamant ransomware variant. Here's what you need to know about this threat.
Security vendors recently discovered a massive malvertising campaign linked to the Angler exploit kit targeting top-tier websites.
The Angler exploit kit has been responsible for the vast majority of botnets created over the past year. Here's how it works and how to stop it.
Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.