A recent attack campaign leveraged a business-to-business (B2B) website to distribute a new exploit kit named Spelevo.
In theory, dealing with BlueKeep should be no different from dealing with other vulnerabilities. Unfortunately, many organizations are lagging in their patch management efforts.
Researchers discovered a Mirai malware variant with 18 exploits targeting embedded internet of things (IoT) devices.
Researchers observed an attack campaign exploiting CVE-2019-2725 and abusing certificate files to deliver a Monero miner.
According to researchers, the fileless attack uses PCASTLE to distribute samples of XMRig, a well-known Monero-mining malware family.
The new BlackSquid malware is capable of abusing eight notorious exploits in its attempts to install the XMRig Monero miner.
Recent variants of Sodinokibi accounted for scaling issues as the ransomware family steadily moves to target large enterprises.
Two years since the WannaCry attacks wreaked havoc around the world, researchers say hundreds of thousands of people are being targeted with the EternalBlue exploit on which it was based.
An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.
Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions.