The KeyBoy attacker group recently used known exploit code for two Microsoft security flaws to infect machines with TSSL and Titan Android malware, according to AlienVault.
A free browser plugin for creating, editing and viewing PDF files contains 18 security vulnerabilities that could expose users to remote code execution.
A new malware builder known as Gazorp lets threat actors create free, customized AZORult attacks on the dark web.
Researchers discovered a large tech support scam operation called Partnerstroka that preyed on unsuspecting users with an innovative browser locking technique.
What is ransomware? In short, it's malware that encrypts your data and demands a ransom fee for its supposed safe return. The best defense against this threat is to keep it off the network altogether.
As an IT managed service provider (MSP), you can help clients save money by providing a high-value endpoint security service that closes the visibility gap.
New Gartner Report Recommends a Vulnerability Management Process Based on Weaponization and Asset Value
Gartner's new report recommends factoring severity, asset value and active exploits into your vulnerability management process.
The volume of CVE data is rapidly growing, and security teams need continuous visibility into their assets and associated risks to stay on top of emerging threats.
A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.