Researchers observed a threat actor known as SWEED using typosquatting and UAC bypassing techniques to distribute Agent Tesla and other malware.
Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models.
Threat actors launched an attack campaign that uses a Golang-based spreader to distribute cryptocurrency-mining malware, according to researchers.
Security researchers discovered two malicious Android apps that leveraged a clever 2FA bypass technique to steal Turkish users' cryptocurrency credentials.
With more devices outside the corporate perimeter and more apps stored in the public cloud, organizations must abandon on-premises security for new conditional access models to achieve zero trust.
A new threat called HiddenWasp is different from other Linux malware in that it's focused solely on achieving targeted remote control of infected hosts.
Social engineering will always be one of the easiest ways for threat actors to get what they want. So what can enterprises do to decrease the risk?
Researchers spotted a phishing campaign delivering a multi-feature, open-source remote administration tool known as Babylon RAT.
Threat actors have launched a new malware campaign that uses an MitM attack to infect unsuspecting users with the Plead backdoor.
An advanced persistent threat (APT) group known as ScarCruft is now using malware to steal information off of Bluetooth devices.