2 min read - Security researchers discovered a new Ursnif malware delivery campaign leveraging Excel 4.0 macro functionality.
2 min read - Security researchers observed the Trickbot operators using a new backdoor called "BazarBackdoor" to gain full access to targeted networks.
2 min read - Security researchers discovered that the Trickbot Trojan has replaced its "mworm" propagation method with a new "nworm" module.
3 min read - The United States Cyberspace Solarium Commission has made several recommendations for how the U.S. can strengthen its online infrastructure through government-enterprise cooperation.
2 min read - Security researchers observed PonyFinal ransomware using brute-force attacks to access targeted organizations' networks.
2 min read - Security researchers observed the "AnarchyGrabber3" malware modifying the Discord client to steal its victims' plaintext passwords.
< 1 min read - Security researchers discovered that students could abuse vulnerabilities in certain LMS plugins to access records and edit data.
2 min read - Security researchers discovered that the new LeetHozer botnet shares some attack resources with the Moobot malware family.
2 min read - Security researchers observed Moobot and other botnets attempting to exploit a zero-day vulnerability in order to compromise fiber routers. Read on to learn more about Moobot's recent activity.
2 min read - A phishing campaign is targeting WebEx users who are working from home by spoofing IT security alerts, according to security researchers.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.