2 min read - Security researchers observed PonyFinal ransomware using brute-force attacks to access targeted organizations' networks.
2 min read - A grouping of similar threat activity dubbed "Blue Mockingbird" attempted to distribute Monero-mining malware payloads across its enterprise targets.
3 min read - The authors of Shade ransomware announced that they were releasing 750,000 decryption keys to help victims recover their files for free. Learn what else happened last week in security news.
2 min read - Security researchers observed that a new attack campaign replaced PowerShell with mshta as a means to distribute Ursnif malware.
2 min read - Security researchers detected an Ursnif campaign that leveraged a new infection chain to target users based in Italy.
2 min read - An estimated 200 million modems or more may be vulnerable to an exploit dubbed Cable Haunt, which researchers said would give attackers complete control over their victims' devices.
3 min read - Researchers found that the Xhelper Android dropper had infected more than 45,000 Android devices in the span of six months. Learn what else happened last week in security news.
2 min read - According to researchers, the fileless attack uses PCASTLE to distribute samples of XMRig, a well-known Monero-mining malware family.
2 min read - The new BlackSquid malware is capable of abusing eight notorious exploits in its attempts to install the XMRig Monero miner.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.