Security teams can generate valuable insights about ongoing attacks by using log services and threat intelligence to analyze C&C traffic.
At Black Hat 2018 and DEF CON 26, experts shared insights about IoT security risks and vulnerabilities and offered advice to help organizations and consumers navigate our increasingly connected world.
Google pulled 145 Android apps from its Play Store after Palo Alto Networks discovered that they were infected with Windows malware, posing a mobile app security threat to the software ecosystem.
Phishing is still among the most common causes of a data breach. Companies should invest in managed security services and comprehensive awareness training to improve email security best practices.
Trickbot has formed a partnership with another banking Trojan, IcedID, to help distribute each other's malware more widely — and possibly co-develop new capabilities.
A quarterly threat report revealed that malicious email attacks increased by 36 percent and delivered more diverse payloads in Q2 2018.
According to security researchers, a new modular remote access Trojan (RAT) is using several sophisticated techniques to fly under the radar of traditional detection solutions.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
Security researchers observed CactusTorch, a fileless malware, using a .NET executable to run harmful .NET assemblies from memory.
According to security researchers, the Emotet Trojan is not only still active but has become more sophisticated and persistent in the four years since its initial discovery.