A new router attack targeting MikroTik devices exploits a Winbox bug to install CoinHive malware and create backdoors.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
In the process of fixing a flaw discovered in March 2018, security researchers from Drupal discovered another vulnerability that could enable threat actors to deliver cryptocurrency mining malware.
A recent ransomware attack against a Missouri hospital showed that healthcare organizations are still under threat despite an overall decline in campaigns across industries.
Despite an overall shift away from traditional ransomware in favor of crypto-mining malware, research shows that ransomware is still alive and well in the form of highly targeted attacks.
The first quarter of 2018 saw a rise in cybersecurity threats such as ransomware, Internet of Things (IoT) vulnerabilities and zero-day threats.
Researchers Report Nearly 20,000 Vulnerabilities in 2017, Reinforcing the Need for a Proactive Cybersecurity Strategy
A recent study revealed that the number of software vulnerabilities soared to almost 20,000 in 2017, suggesting an urgent need for organizations to adopt a proactive cybersecurity strategy.
According to a recent survey, less than 30 percent of IT security executives said they would be able to prevent ransomware attacks such as WannaCry and Petya.
A recent study suggested that small business cybersecurity threats are on the rise, as evidenced by the fact that the average small business website sustained 44 attacks per day during Q4 2017.
According to recent research, Slingshot APT has victimized nearly 100 organizations since 2012 using kernel-level privileges to load malware and evade detection.