Threat actors have taken a liking to IQY files, which are foreign to most users and appear benign to many spam filters.
A recent attack against a cryptocurrency exchange planted a Trojan that spread across both Windows and MacOS machines to steal information and digital coins, according to security researchers.
According to security researchers, a new modular remote access Trojan (RAT) is using several sophisticated techniques to fly under the radar of traditional detection solutions.
To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.
IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
"Pokemon Go" can load rootkits into devices along with the hot game, which could wreak havoc on individual users and enterprise networks alike.
Cybercriminals could be leveraging remote tools such as OmniRAT to take over Android devices and steal data from unsuspecting victims.
A new remote-access Trojan (RAT) named Moker has been discovered by security researchers — and has skittered past every security measure used.
New, low-cost malware tools such as Predator Pain and Limitless pose a growing threat to small and midsize businesses (SMBs), according to Trend Micro.
Customers are at significant risk due to a recently reported Adobe breach.