Researchers spotted a phishing campaign delivering a multi-feature, open-source remote administration tool known as Babylon RAT.
Per X-Force IRIS, at least 22 percent of reported campaigns in April 2019 delivered macro malware. What methods can defenders leverage to help detect malicious macro activity?
Hackers today are more sophisticated and coordinated than the dark, hooded figures often portrayed in movies. Threat hunting is critical to spot threats before they cause damage on the network.
Cybersecurity AI is approaching maturity. Are you prepared to defend against a new wave adversarial machine learning risks?
The Retefe banking Trojan has resumed its activity with a new series of attack campaigns that leverage Smoke Loader as an intermediate loader.
A new variant of the Emotet banking malware is using compromised connected devices as first-layer command-and-control (C&C) servers.
Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy.
Researchers spotted the operators of the Aggah campaign exploiting Bit.ly, BlogSpot and Pastebin to spread variants of the RevengeRAT malware in the Middle East, Asia, Europe and the U.S.
How do enterprises get started on the road to cyber resilience? According to Dr. Ponemon, it starts with vigilance and visibility.
Fighting fileless malware attacks will take some serious effort and careful coordination among a variety of tools and techniques.