3 min read - Researchers spotted a flaw in an updated Ryuk ransomware decryptor used by attackers that could limit victims' recovery efforts. Read on to learn what else happened last week in security news.
2 min read - Researchers observed the HawkEye keylogger acting as the first-stage downloader for a cryptocurrency miner in a new phishing campaign.
3 min read - Researchers revealed that the new Phoenix keylogger is steadily gaining traction among digital criminals on underground web forums. Learn what else happened last week in security news.
3 min read - Last week in security news, Capital One disclosed a security breach that exposed the personal information of more than 100 million customers.
3 min read - IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.
2 min read - Security researchers recently identified two malware distribution campaigns that infect customers of Brazilian financial institutions with banking Trojans.
2 min read - A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
< 1 min read - A new attack campaign is using Rich Text Format (RTF) files to distribute the Agent Tesla Trojan along with other malware.
2 min read - Astaroth is back in full force; security researchers discovered that the infamous Trojan malware infected more than 8,000 South American machines in just one week.
2 min read - Mobile's latest malware threat is more than just a banking Trojan — it's an all-in-one Android attack that combines ransomware, phishing and keylogging to compromise devices.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.