Security researchers discovered a recent phishing scheme that took advantage of Hurricane Michael's impact to steal victims' email credentials across multiple services.
Researchers reported that the Octopus malware is using a Windows Trojan to target political entities based in Central Asia.
Researchers believe that a new APT group known as GreyEnergy, which they observed targeting ICS consoles across Poland and Ukraine, may be a successor to BlackEnergy, the group that authored NotPetya.
A new version of GandCrab, another malware security warning. This iteration uses NTCrypt to facilitate code obfuscation and hook more potential victims.
The U.S. Fire Administration's five key components of a fire safety education program serve as a useful framework for CISOs looking to boost their company's ability to respond to a cyber emergency.
The KeyBoy attacker group recently used known exploit code for two Microsoft security flaws to infect machines with TSSL and Titan Android malware, according to AlienVault.
Researchers uncovered a YouTube scam in which several fraudulent channels urge unsuspecting "Doctor Who" fans to submit personal data to supposedly stream the British science fiction show.
IBM X-Force researchers observed the Necurs botnet spewing millions of spam emails from more than 30,000 malicious IPs to extort bitcoin from victims who may or may not have viewed adult content.
X-Force observed attackers using known Drupal vulnerabilities, including Drupalgeddon, to target websites and the underlying infrastructure that hosts them, leveraging Shellbot to open backdoors.
Over the next two months, companies should educate and test their employees to prepare for the rise in phishing attacks related to benefits enrollment and holiday party and charity campaign planning.