Researchers observed a threat actor known as SWEED using typosquatting and UAC bypassing techniques to distribute Agent Tesla and other malware.
Experts Emma Bickerstaffe and Jaime Cowper discuss the evolving security operations center (SOC): What's current, what's new and what's on the horizon?
Digital attackers are now abusing the 16Shop phishing kit to target Amazon users for the purpose of stealing access to their accounts.
Threat intelligence provides the context SOC analysts need to proactively identify DNS security threats and prevent future DNS attacks.
If you saw a coworker browsing through a database they weren't supposed to have access to, would you report it? New research suggests that employees often underreport such security incidents.
A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.
An Astaroth attack leveraged only living-off-the-land techniques to run the backdoor directly in memory on Windows machines.
While the cybersecurity skills gap is a years-old challenge, organizations are facing a new conundrum: The cyber kill chain is getting shorter. How can the industry address these dual problems?
Researchers observed the TA505 threat group using spam campaigns to deliver two new payloads: the Gelup malware tool and the FlowerPippi backdoor.
Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.