The Sofacy group recently targeted several government organizations around the world with the new Cannon Trojan.
The IBM X-Force Red team recently ran into trouble on a black-box penetration testing assignment. Here's how the testers overcame the obstacles to ultimately establish a solid adversarial operation.
Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?
In this first article of a two-part series, IBM X-Force exposes some of its research on the typical malware and tactics, techniques and procedures (TTPs) used in Brazilian financial cybercrime.
Ahead-of-threat detection enables security professionals and consumers to identify potential phishing websites faster than traditional browser protection apps can blacklist active cyberthreats.
A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
A PDF attack campaign conducted by the Cobalt Gang used a specially crafted document to evade dection by static analysis tools.
As threat research team lead at Trusteer, Tomer guards the gateway to both known and unknown threats and passes along his insights to help banking customers protect themselves from social engineering.
A new Cutwail spam campaign is leveraging steganography — hiding data within images — to compromise devices and download URLZone.
A security escape room can be a fun and interactive way to train employees on various security concepts they might otherwise ignore.