Many of the city of Baltimore's public services remain offline two weeks after the municipality fell victim to a ransomware attack.
Two years since the WannaCry attacks wreaked havoc around the world, researchers say hundreds of thousands of people are being targeted with the EternalBlue exploit on which it was based.
The Federal Bureau of Investigation (FBI) has determined that more than 100 U.S. businesses suffered Ryuk ransomware infections between August 2018 and mid-May 2019.
A 13-year-old security threat known as Dharma ransomware is spreading through a variety of distribution methods, leading to a 148 percent increase in detections over a two-month period.
The Retefe banking Trojan has resumed its activity with a new series of attack campaigns that leverage Smoke Loader as an intermediate loader.
Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both.
A new variant of the Emotet banking malware is using compromised connected devices as first-layer command-and-control (C&C) servers.
Security researchers discovered that a new DLL CryptoMix ransomware variant is reportedly using Windows Remote Desktop Services (RDS) to install itself on unsuspecting users' machines.
Threat actors compromised an account with administrator privileges to infect a manufacturing company with BitPaymer ransomware.
A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.