Security analysts identified a sample of Linux crypto-mining malware that kills any other malicious miners upon installation.
According to IBM X-Force IRIS research, there are several security concerns that should be taken into consideration before using Siri Shortcuts.
Security researchers observed the Razy Trojan installing malicious extensions across multiple web browsers to steal cryptocurrency.
EdTech today stores more personally identifiable information on K-12 students than ever, but the FBI warns that much of that data is severely exposed to threat actors.
Researchers have spotted a malvertising campaign that is delivering two payloads to victims: the Vidar information stealer and GandCrab ransomware.
Several major U.S. newspapers reported they were victims of production-disrupting cyberattacks that apparently involved Ryuk ransomware.
Researchers discovered two new Satan variants targeting organizations in the financial sector with Monero miners and ransomware.
Ad malware ramps up with the surge in online shopping activity during the holiday season. Taking a few precautionary steps can help consumers and security teams protect their devices and networks.
Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage
Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.
A new strain of Dharma ransomware is able to evade detection by nearly all of the antivirus solutions on the market.