Researchers discovered a family of bots dubbed Chalubo launching distributed denial-of-service (DDoS) attacks to brute-force Linux-based systems running internet-facing SSH servers.
A new attack campaign is using Rich Text Format (RTF) files to distribute the Agent Tesla Trojan along with other malware.
For companies that want to understand what is happening in their networks but lack malware analysis tools, using what is publicly available could be the difference between an infection and a crisis.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
Researchers reported that the Octopus malware is using a Windows Trojan to target political entities based in Central Asia.
Researchers believe that a new APT group known as GreyEnergy, which they observed targeting ICS consoles across Poland and Ukraine, may be a successor to BlackEnergy, the group that authored NotPetya.
A new version of GandCrab, another malware security warning. This iteration uses NTCrypt to facilitate code obfuscation and hook more potential victims.
Cybercriminals buried crypto-mining malware inside compromised websites in an effort to hijack victims' computing resources.
The KeyBoy attacker group recently used known exploit code for two Microsoft security flaws to infect machines with TSSL and Titan Android malware, according to AlienVault.
Researchers from FortiGuard Labs discovered a malware sample called iTranslator that installs two drivers onto infected machines to perform man-in-the-middle (MitM) attacks.