According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.
Tax scam season has arrived. Here's what enterprises need to know to keep their corporate assets safe from tax-time scammers.
Researchers observed variants of the Emotet Trojan injecting themselves into existing email conversations as a means of distributing malicious links.
We can probably all agree that securing the devices on our networks is a fair definition of endpoint security. But within this traditional definition, what, really, is the endpoint of today?
Security researchers observed sextortion scammers launching new attack campaigns that leverage image spam and other clever techniques to trick users into fulfilling their demands.
Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
Online fraudsters are exploiting users' excitement for March Madness by targeting them with phishing attacks and streaming scams.
If we look close enough, many new security threats are something we've seen in another form or an attack style we've had to previously defend against.
Security researchers discovered that attackers are using fake copyright infringement notifications as part of a recent Instagram hacking campaign.
Researchers observed an attack campaign distributing fake browser updates to infect website visitors with ransomware and banking malware.