The cybercriminals behind the Necurs botnet are now taking screenshots of victims' machines to improve the performance of ransomware attacks.
A cybergang known as FIN7 has been using OLE command files to spread its malware and identify potential victims for additional phishing attacks.
A malware researcher uncovered a spamming operation that compromised more than 711 million email addresses, the largest known data breach of its kind.
By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
Cybercriminals recently breached two popular cryptocurrency platforms to steal personal information and digital funds to the tune of $300,000.
Since January, cybercriminals have responded to browser security enhancements by increasing their use of HTTPS in phishing sites.
Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.
Barracuda Networks observed a phishing attack that used fraudulent airline tickets to trick victims into volunteering corporate credentials.
Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.