
Dok Mac malware intercepts victims’ web traffic, installs backdoor
A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …

200 million financial services records breached in 2016, 900% increase from 2015
The financial services industry was attacked more than any other industry in 2016 – 65 percent more than the average organization across all industries, according to the IBM …

IT service providers, many other orgs targeted in long-standing attack campaign
US-CERT has released an alert warning about a sophisticated attack campaign using multiple malware implants and targeting organizations in the IT, Energy, Healthcare and …

Will fileless malware push the antivirus industry into oblivion?
The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. …

Know your enemy: Defining the new taxonomy of malicious emails
Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …

Cybercrime can come in any shape or size, and not always the form you’d expect
Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …

Modern threat landscape: Seismic shifts in motivation and focus
Cybercriminals revealed new levels of ambition in 2016 – a year marked by extraordinary attacks, including multi-million dollar virtual bank heists and overt attempts to …

Phishing attacks responsible for three-quarters of all malware
With phishing now widely used as a mechanism for distributing ransomware, a new NTT Security reveals that 77% of all detected ransomware globally was in four main sectors – …
BrickerBot bricked 2 million IoT devices, its author claims
The author of BrickerBot, which “bricks” IoT devices by rewriting the flash storage space and wiping files, has emerged to explain that the malware first attempts …

Locky ransomware makes a comeback, courtesy of Necurs botnet
The Necurs botnet has, once again, begun pushing Locky ransomware on unsuspecting victims. The botnet, which flip-flops from sending penny stock pump-and-dump emails to …

RawPOS malware has new data-grabbing capabilities
RawPOS continues to evolve, and has recently been equipped with the capability to steal data contained in the victims’ driver’s license’s 2-dimensional …

An untold cost of ransomware: It will change how you operate
Ransomware is unfortunately an IT reality. With the complexity and frequency of attacks, there is a good chance you or someone you know has been impacted. Many victims …
Featured news
Resources
Don't miss
- Report: The State of Secrets Sprawl 2025
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373)
- Moving beyond checkbox security for true resilience
- Dependency-Check: Open-source Software Composition Analysis (SCA) tool
- Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK