Please turn on your JavaScript for this page to function normally.
IoT
Leaked: Source code for Mirai IoT DDoS botnet

IoT-powered DDoS attacks are on the rise, and the situation is poised to become even worse now that the source code for the Mirai malware has been made public. Reporter Brian …

skull
How ransomware is impacting companies in six major industries

BitSight analyzed the security ratings of nearly 20,000 companies to identify common forms of ransomware and to determine which industries (amongst Finance, Healthcare, …

danger
Surge in polymorphic attacks and malicious Android apps

Users are over 20 percent less likely to encounter malware and other undesirable executable files than in 2015. The data, collected by Webroot, shows that, although the number …

find
UK online banking customers are back on fraudsters’ radar

Hot on the heels of the Ramnit Trojan delivery campaign targeting customers of six UK banks comes one delivering the Qadars Trojan. The targets, again, are customers of UK …

download
Malicious torrents management tool uncovered

InfoArmor researchers have uncovered Raum, a tool that is used by Eastern European organized crime group “Black Team” to deliver malware to users through malicious …

Lock keyboard
HDDCryptor ransomware uses open source tools to thoroughly own systems

HDDCryptor (aka Mamba) is a particularly destructive piece of ransomware that encrypts files in mounted drives and network shares, locks the computers’ hard disk, and …

danger
Ransomware families and volume of attacks continue to rise

Both the number of variants of ransomware and volume of malware attacks were on the rise in August, according to Check Point. During August, the number of active ransomware …

skull
Students unaware about ransomware costs, impact

A new Webroot survey reveals a disconnect between what college students say they would pay to access personal data being held for ransom and the reality of actual ransomware …

bomb
Ransomware usage explodes, as app, browser and plug-in vulnerabilities increase

Bromium conducted research on cyber attacks and threats affecting enterprise security over the last six months. The good news is while the number of vulnerabilities is …

skull
Five ways to respond to the ransomware threat

The ransomware threat has taken a sharp upturn this year. In fact, a recent industry study found that nearly half of all U.S. businesses have experienced at least one …

Danger
Macro-based malware evolves to bypass traditional defenses

Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …

Seagate Central
Your Seagate Central NAS could be hosting mining malware

If you have discovered cryptocurrency mining malware on your system, have removed it, and got compromised again without an idea about how it happened, it could be that the …

Don't miss

Cybersecurity news