Recent variants of Sodinokibi accounted for scaling issues as the ransomware family steadily moves to target large enterprises.
The Retefe banking Trojan has resumed its activity with a new series of attack campaigns that leverage Smoke Loader as an intermediate loader.
What is the Dark Web, besides an underground haven for cybercriminals to exchange ideas and illicit data anonymously? It can also be a valuable tool for security teams looking to share threat data.
A new vulnerability called TorMoil exploits a browser flaw to bypass security relays and expose real IP addresses belonging to Tor users.
Security researcher Dr. Neal Krawetz reported that the Tor browser discloses details that could enable fraudsters to deduce individual use patterns.
Fraudsters with deep pockets have been spreading malware to Tor users through signed DRM files that redirect victims' browsers without warning.
Cybercriminals are steeped in a culture of trading malicious tools. This Dark Web marketplace drives the evolution of the cyberthreat landscape.
A new cross-browser fingerprinting technique has the ability to identify user hardware. Is there any way for users to stay anonymous anymore?
Following the statutes on restricting VPNs that was enacted by the Turkish government in November, it seems that the Tor network has also been affected.
Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.