A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.
A new spear phishing campaign leverages a series of malicious emails to target and compromise Russian-speaking enterprises via hidden backdoors.
A single breach is all it takes to wreak havoc on a health care organization that relies solely on perimeter controls for critical data protection.
A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
Floki Bot is more versatile than most banking Trojans because it uses spear phishing methods and the RIG exploit kit to steal credit card track data.
IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.
Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.
A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.