Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.
Astaroth is back in full force; security researchers discovered that the infamous Trojan malware infected more than 8,000 South American machines in just one week.
Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
RSA, in collaboration with major security firms and GoDaddy, has identified and eliminated many of the subdomains used in the RIG exploit kit.
Researchers disclosed a new method known as "ghost host," in which malware authors input false names in the HTTP host fields of a botnet's communications.
Understanding the common tactics that cybercriminals use to mask malicious domains is key to keeping users from clicking on harmful links.