A spate of cryptocurrency-mining malware that affected Windows systems, Linux machines, and routers have been identified last September . The malware variants employed a variety of methods to hide and spread their malicious mining activities.
Organizations can still fall victim to targeted attacks because of the increasing sophistication of tactics and tools threat actors use to breach the network perimeter. What can you do to stay protected?
Three hospitals of the DCH Health System were hit by a ransomware attack on October 1, forcing the medical institutions to turn away noncritical patients while they work to securely restore their affected IT systems.
CVE-2019-16928, a vulnerability involving the message transfer agent Exim, could result in threat actors being able to launch denial-of-service (DoS) or remote code execution (RCE) attacks.
A couple discovered that their Nest security system was hacked after their thermostat was repeatedly set to high temperatures despite being adjusted and the hacker started talking to them via the camera.
The threat actors operating the Emotet malware broke its nearly four-month hiatus by launching a spate of malicious spam emails targeting German-, Italian-, Polish-, and English-speaking users.
A new variant of HDDCryptor aka Mamba was uncovered recently. The ransomware has been known to use DiskCryptor to encrypt disk and network files and overwrite the Master Boot Record (MBR).
Our research highlights the current and new risks that the financial industry will have to defend against, and predict how cybercriminals will abuse and attack Open Banking.
A new family of malware with an apparent connection to the notorious Ryuk ransomware was uncovered — but instead of encrypting files, they were found targeting government-, military-, and finance-related files.