Floki Bot is more versatile than most banking Trojans because it uses spear phishing methods and the RIG exploit kit to steal credit card track data.
IBM observed a spike in malware activity that uses Visual Basic for Applications (VBA) macros to deliver malicious attachments.
Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.
A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.
A recent study indicated U.K. companies are not investing enough into security awareness training and expose themselves to phishing attacks as a result.
Malicious macros used in phishing emails can load fileless malware, which goes into a machine's program memory and can wreak havoc.
Macro malware is making a comeback as cybercriminals take advantage of corporate employees with little security awareness.
A new infographic from IBM Emergency Response Services (ERS) details four of the top trends in cybersecurity — as well as some indicators of risk.
Loyalty programs can bring big rewards to customers, but they also may make organizations more appealing to cybercriminals looking to steal data.