Researchers observed a threat actor known as SWEED using typosquatting and UAC bypassing techniques to distribute Agent Tesla and other malware.
Last week, security researchers identified a zero-day vulnerability that was instrumental in a targeted attack against companies in Eastern Europe.
A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.
Security researchers uncovered more than 17,000 samples of Anubis Android malware stored on two related servers.
Researchers observed the TA505 threat group using spam campaigns to deliver two new payloads: the Gelup malware tool and the FlowerPippi backdoor.
IBM X-Force researchers detected, reverse engineered, reconstructed and simulated a Delphi-based Brazilian remote access Trojan.
Both versions of the Godlua backdoor, discovered in late April, are capable of performing distributed denial-of-service (DDoS) attacks, according to a new report.
IBM X-Force researchers discovered, reverse engineered and reconstructed AVLay, a remote access Trojan that mixes DLL hijacking with a legitimate executable borrowed from various antivirus programs.
A recent attack campaign leveraged a business-to-business (B2B) website to distribute a new exploit kit named Spelevo.
Threat actors launched an attack campaign that uses a Golang-based spreader to distribute cryptocurrency-mining malware, according to researchers.