June 28, 2016 Nuclear EK Shuts Down — What’s the Fallout? 2 min read - Now that both Angler and the Nuclear EK have been shut down, cybercriminals will have to search for a replacement to carry out their attacks.
June 28, 2016 POS Malware Delivers Credit Card Theft at Hundreds of Restaurants 2 min read - Customers may have gotten a lot more than a slice of pizza thanks to a POS malware called PunkeyPOS targeting hundreds of pizza restaurants in the U.S.
June 28, 2016 The Fansmitter Method: Stolen Data’s New Sound? 2 min read - Security researchers described a new method of data theft called Fansmitter, which uses cooling fans to slowly exfiltrate information.
June 27, 2016 Malware Top 10: Conficker Grabs Top Spot, Tinba Takes Second 2 min read - Check Point found that the Conficker malware accounts for 14 percent of recognized attacks today, making it the top cyberthreat for the month of May.
June 27, 2016 Flash or HTML5? Malvertising-Makers Will Happily Hijack Both 2 min read - More ad providers are moving to HTML5 to prevent malvertising, but this shift alone isn't enough to deter cybercriminals from their exploits.
June 24, 2016 Necurs Botnet Comes Back From the Dead 2 min read - Just a few weeks after the Necurs botnet was shut down for an unknown reason, the threat has made a comeback and is back in operation.
Malware June 22, 2016 GozNym: Living in America 4 min read - IBM X-Force researchers recently reported that the GozNym banking malware is executing redirection attacks on banks in the U.S.
Malware June 17, 2016 Ransomware: An Ounce of Prevention Is Worth a Pound of Cure 2 min read - The "Ransomware Response Guide" can help your organization prepare for preventing this common threat or validate your existing security policies.
June 16, 2016 RAA Ransomware Is All JavaScript, Researchers Say 2 min read - Security researchers recently discovered RAA ransomware, which leverages its JavaScript code makeup to trick users into thinking it's legitimate.
June 14, 2016 Say Goodbye to the Angler Exploit Kit 2 min read - The Angler exploit kit appears to have been shut down, but cybercriminals are turning to the Neutrino EK to fill the gap left behind.