A malware family known as CARROTBAT is currently using at least 12 unique decoy documents to spread itself among unsuspecting users.
Analysts discovered a new spear phishing attack campaign from the SNAKEMACKEREL group that uses fake Brexit-related documents to infiltrate major government agencies and steal information.
Security researchers observed the Sednit threat group distributing Zebrocy malware using a Delphi dropper and mail downloader.
Bad actors recently launched a Thanksgiving-themed spam campaign that used obfuscation to deliver the Emotet banking Trojan.
Security researchers revealed that two mobile malware threats, Xloader and FakeSpy, may have been developed and launched by the same cybercriminal group.
A new Cutwail spam campaign is leveraging steganography — hiding data within images — to compromise devices and download URLZone.
Researchers observed threat actors impersonating the Brazilian postal service in a malware campaign that combines legitimate Windows files such as WMI and CertUtil to steal banking data.
IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content.
Cybercriminals have been getting an early start on tax-related phishing cases by promising U.K. users a sizable refund in an attempt to steal credit card details and other personal information.
The OilRig threat group recently targeted government offices in the Middle East with a spear phishing attack that involved the Trojan malware BONDUPDATER.