Researchers discovered Geodo botnets using a new spam campaign to deliver samples of Qakbot malware.
Danna Pelleg's childhood curiosity, early technology education and compulsion to fight the bad guys led her to a career as a fraud specialist and security operations team lead at IBM Trusteer.
Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.
Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world's largest banks.
A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
A new phishing kit uses a custom web font to implement a substitution cipher in its campaign to target customers of a major U.S. bank.
A new phone-based phishing scam reveals how fraudsters are devising more sophisticated schemes to prey on Apple device users.
IBM X-Force's top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.
Security researchers discovered a malspam campaign targeting British computer users with the Ursnif/Gozi/ISFB Trojan.
A malware family known as CARROTBAT is currently using at least 12 unique decoy documents to spread itself among unsuspecting users.