Researchers observed variants of the Emotet Trojan injecting themselves into existing email conversations as a means of distributing malicious links.
X-Force data revealed that while browser-based cryptojacking was increasingly popular through most of 2018, cryptomining malware made a resurgence at the end of 2018 and into Q1 2019.
IBM X-Force analyzed modifications made to IcedID that help the banking Trojan act more stealthily on infected devices.
The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.
They may not grab the most headlines, but injection attacks are the most common threats targeting organizational networks, according to IBM MSS data.
To protect students, parents and teachers from data theft, academic institutions must adopt comprehensive strategies to mitigate command injection attacks.
Researchers found an often overlooked vulnerability in DNA data. While uncommon, malicious code injection into synthetic DNA could be a credible threat.
We have recently disclosed a new vulnerability to the Android Security Team. The vulnerability affected many apps, including Settings (the one that is found on every Android device), Gmail, Google Now, DropBox and Evernote. To be more accurate, any...