Threat actors are using targeted attack tools to distribute typical malware, such as cryptocurrency miners and ransomware.
Several major U.S. newspapers reported they were victims of production-disrupting cyberattacks that apparently involved Ryuk ransomware.
Security leaders must implement phishing awareness programs to train employees to recognize business email compromise (BEC) attacks and other social engineering schemes that could compromise data.
Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.
Users need to be on the lookout for malicious attachments, which are growing in popularity thanks to spear phishing and social engineering.
With all the security breaches, it seems like cybercriminals keep getting through. Malware is evolving to evade detection by traditional defenses.
Trusteer's security team has recently identified a new offering from a Russian cybercrime forum member: An exploit that, according to the seller, is successful 95 percent of the time.
Customers are at significant risk due to a recently reported Adobe breach.
Will white-listing or blacklisting better protect your enterprise? We weigh in on the ongoing debate.