Researchers at ESET discovered a malicious crypto-mining campaign launched via the Kodi platform that used add-on repositories to spread malware through Kodi's ecosystem and mine for Monero.
Security researchers observed the threat group Cobalt Gang using a downloader known as CobInt to infect and subsequently install additional malware on systems of interest.
What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether.
As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap.
Researchers discovered spam campaigns last month that exploited IQY files to flood Japanese users with BEBLOH and URSNIF malware.
Central to DcyFS's cyber deception capabilities is its ability to modulate subject trust through a hierarchical file system organization.
Malware authors have released modified versions of the Mirai and Gafgyt IoT malware that are capable of targeting vulnerabilities affecting SonicWall's GMS and Apache Struts.
DanaBot, one of the most recent financial cyberthreats, has developed a way to avoid detection on virtual machines as it shifts focus from Australia to Poland.
Researchers observed a new threat actor known as Rocke leveraging a varied tool kit and multiple payloads to distribute cryptomining malware, including Monero miners.
A new zero-day vulnerability affecting Windows 7 through 10 was recently disclosed on Twitter. Within two days, security researchers spotted it in the wild.