Researchers discovered spam campaigns last month that exploited IQY files to flood Japanese users with BEBLOH and URSNIF malware.
Threat actors have taken a liking to IQY files, which are foreign to most users and appear benign to many spam filters.
Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
The volume of malicious email reached a record 14.5 billion messages over the course of 2017, according to a new global IT security research report that suggested even bigger threats to come this year. According to AppRiver, the cloud-based data...
A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
A new banking Trojan is using old PowerShell tricks to hide its activity from detection tools by continually launching malicious CHM files.
According to recent IBM X-Force data, spammers and spam botnets typically work the same hours we do to maximize their returns.
According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.