Researchers recently discovered a malvertising campaign that ran undetected for weeks, calling attention to the need for stricter online ad security.
New research showed that Google Search Console can be manipulated by cybercriminals to hijack websites and prevent webmasters from playing defense.
It wasn't all that long ago that Windows XP was present in the vast majority of enterprises. In fact, it's still prevalent, bringing many security risks.
Malware and ransomware can strike users who aren't aware of best practices or common attack techniques, so it's up to security teams to raise awareness.
CoreBot's developers have evolved the malware into a full-fledged banking Trojan that executes a variety of attacks to steal victims' bank credentials.
The WhatsApp Web client is now vulnerable to a vCard-led attack, according to researchers. How can users patch the vulnerability and avoid the issue?
A new type of Trojan has been sneaking into the Google Play store and could be infecting the mobile devices of unsuspecting users.
IBM Security X-Force researchers recently uncovered a new trend dominating the cybercrime underground: the sale of stolen or fraudulent certificates.
IBM X-Force researcher Igor Aronov examines some common techniques used by malware authors to complicate dynamic (automated) and static (manual) analysis.
Users need to be on the lookout for malicious attachments, which are growing in popularity thanks to spear phishing and social engineering.