When it comes to social engineering training, make sure every employee learns the names of specific attacks.
Fraudsters are abusing a Google Calendar feature that's commonly enabled on smartphones to target unsuspecting users with scam offers.
Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
Researchers spotted the operators of the Aggah campaign exploiting Bit.ly, BlogSpot and Pastebin to spread variants of the RevengeRAT malware in the Middle East, Asia, Europe and the U.S.
Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.
Online fraudsters are exploiting users' excitement for March Madness by targeting them with phishing attacks and streaming scams.
Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
Using unique methods of analyzing DNS data, advanced DNS analytics enables security teams to quickly and proactively find and eliminate potential threats.
Astaroth is back in full force; security researchers discovered that the infamous Trojan malware infected more than 8,000 South American machines in just one week.