
Malware leverages web injects to empty users’ cryptocurrency accounts
Criminals trying to get their hands on victims’ cryptocurrency stashes are trying out various approaches. The latest one includes equipping malware with …

Malicious apps in app stores decrease 37 percent
Malicious mobile apps were on the decline in Q4 of 2017 largely due to a decrease in the inventory of AndroidAPKDescargar, the most prolific dealer of blacklisted apps, …

Malicious activity surges coincide with geopolitical events
Comodo released its Global Malware Report 2017, which culminates a year of security analysis and research into threat patterns. Among its major findings: 2017 was a year of …

Record surges in healthcare attacks, fileless malware, cryptocurrency mining
During Q4 2017, McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 …

Not all who pay a ransom successfully recover their compromised data
A new report by the CyberEdge Group found that 55 percent of responding organizations were compromised by ransomware in 2017, down from 61 percent in 2016. How victims …

Intelligence sharing is crucial in the fight against cybercrime
Malware variants previously focused on the financial sector are now successfully attacking non-banking targets, according to Blueliv. A higher level of collaboration and …

Cyber attacks becoming No. 1 business risk
SonicWall recorded 9.32 billion malware attacks in 2017 and saw more than 12,500 new Common Vulnerabilities and Exposures (CVE) reported for the year. “The cyber arms race …

Cryptocurrency-stealing malware relies on victims copy-pasting wallet info
An unconventional email spam campaign has been delivering unusual cryptocurrency-stealing malware to American and Japanese users. The emails are sporting “Re: …

Cryptojacking is the new malware
The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which these currencies are earned. At its core, mining …

UK government officially blames Russia for NotPetya attack
The UK government has officially attributed the June 2017 NotPetya cyber attack to the Russian government. The statement is backed by an assessment of the UK’s National Cyber …

Cryptomining malware continues to drain enterprise CPU power
Cryptomining malware continues to impact organizations globally as 23% were affected by the Coinhive variant during January 2018, according to Check Point’s latest Global …

How cybercriminals exploited Telegram flaw to deliver malware
A “vulnerability” in Telegram’s desktop instant messaging client for Windows was exploited for months by Russian cybercriminals to deliver malware to users. …
Featured news
Resources
Don't miss
- Vulnerable firmware for Gigabyte motherboards could allow bootkit installation
- AsyncRAT evolves as ESET tracks its most popular malware forks
- Inorganic DNA: How nanoparticles could be the future of anti-counterfeiting tech
- Securing vehicles as they become platforms for code and data
- How service providers can turn cybersecurity into a scalable MRR engine