A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
Threat actors are using targeted attack tools to distribute typical malware, such as cryptocurrency miners and ransomware.
When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing.
A 13-year-old security threat known as Dharma ransomware is spreading through a variety of distribution methods, leading to a 148 percent increase in detections over a two-month period.
The traditional Windows device management solutions that IT admins have used for years are evolving into unified endpoint management solutions to fit the needs of today's security landscape.
A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
Millions of ports are being left open online, and many of these are being exposed to potential attackers through the remote desktop protocol (RDP).
Researchers from Kaspersky Lab recently discovered a new backdoor Trojan, called CowerSnail, that targets Windows computers.
Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.