Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
Fraudsters obviously prefer to deal in digital currency to remain anonymous, but bitcoin and ransomware are also intertwined in other, more complex ways.
Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
With its study of over 30 types of devices, U.K. security firm Pen Test Partners concluded that DVRs remain a major IoT malware platform.
Mobile devices that contain unsanctioned apps are particularly vulnerable to man-in-the-middle attacks, especially when connected to unsecured Wi-Fi.
A security researcher discovered how to create malicious Apache modules, giving cyberattackers a new way to tap into and control web servers.
The TrickBot Trojan, which recently tested redirection attacks in France, expanded its list of targets to include banks in Sweden and other Nordic areas.
Actors have exploited a patched flaw to push a cryptocurrency miner to vulnerable Linux machines. The attacks take advantage of a vulnerability in Samba.
The first Mac malware-as-a-service threats suggests attackers are starting to see the operating system as a potential target.
Two new linux Trojan strains have been discovered: One attempts to mine cryptocurrency, while the other cloaks the threat actor's identity.