Fraud Protection May 3, 2017 The Increasing Sophistication of the Tech Support Scam 2 min read - It may be the oldest trick in the book, but the tech support scam remains a popular method among fraudsters, according to a recent report.
May 2, 2017 Malware Campaign Targets Crucial Business Data 2 min read - Organizations across a range of industries are being targeted in a sophisticated campaign that uses malware to put critical information at risk.
May 2, 2017 New Mac Malware Targets User Communications 2 min read - A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
May 2, 2017 Failed Fix? Endpoint Tools Overwhelmed, Underequipped to Handle Emerging Malware Threats 3 min read - A surge of new fileless malware and advanced file-based threats is making endpoint protection and monitoring all the more critical.
Fraud Protection May 1, 2017 Zero-Day Malware Poses a Growing Threat 2 min read - The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.
Malware April 27, 2017 TrickBot Is Hand-Picking Private Banks for Targets — With Redirection Attacks in Tow! 4 min read - According to IBM X-Force Research, the operators of the infamous TrickBot Trojan have been hand-picking private banks to target with redirection attacks.
April 26, 2017 Stealthy Remote Access Trojan Resurfaces 2 min read - A remote access Trojan remained undetected for several years due to its unconventional operating methods. Here's what to know about the Cardinal RAT.
Malware April 24, 2017 The Necurs Botnet: A Pandora’s Box of Malicious Spam 11 min read - Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
April 20, 2017 Vigilante White-Hat Hacker Boosts IoT Device Security 2 min read - Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
April 20, 2017 Files With That? Ransomware-as-a-Service Lets Would-Be Fraudsters Order on Demand 2 min read - Ransomware-as-a-service empowers cybercriminals to order up infections on-demand. Is this the future of digital attacks?