A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
A Canadian university had to take critical IT systems offline after security professionals identified an attack designed to mine cryptocurrency using the school's computing resources.
To reduce hidden endpoint management costs, look for solutions that give you comprehensive visibility into your endpoint landscape and enable you to consolidate tools and increase efficiency.
To improve the company's overall cyber resilience posture, security leaders must promote a culture of cybersecurity awareness from the top down. They can start by debunking these six common myths.
A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
A new version of GandCrab, another malware security warning. This iteration uses NTCrypt to facilitate code obfuscation and hook more potential victims.
The KeyBoy attacker group recently used known exploit code for two Microsoft security flaws to infect machines with TSSL and Titan Android malware, according to AlienVault.
A free browser plugin for creating, editing and viewing PDF files contains 18 security vulnerabilities that could expose users to remote code execution.
A new malware builder known as Gazorp lets threat actors create free, customized AZORult attacks on the dark web.
Researchers discovered a large tech support scam operation called Partnerstroka that preyed on unsuspecting users with an innovative browser locking technique.