Researchers observed variants of the Emotet Trojan injecting themselves into existing email conversations as a means of distributing malicious links.
To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?
Some of the latest website security threats originate from thriving dark web marketplaces for TLS/SSL certificates, which often come packaged with other cybercrime services.
Security researchers discovered that a threat actor is targeting LinkedIn users with fake job offers to deliver the More_eggs backdoor.
Now that you've identified an AI solution and selected a suitable algorithm for your machine learning model, you're ready to measure the effectiveness of your security classifier.
Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.
Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.
One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats.
Before you can choose the right machine learning algorithms to serve your business' needs, you must understand the type of problem you're trying to solve and the type of training data you'll need.