WannaCry continues to be a reminder of the challenges that organizations face dealing with the ransomware threat.
Author: Jai Vijayan, Contributing Writer
IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.
Some mobile apps are being weaponized with Trojans that secretly sign Android users up for paid subscription services.
Cybersecurity has to be a top priority as enterprises begin incorporating the use of nonfungible tokens into their business strategies, brand-awareness campaigns, and employee-communication efforts, experts say.
An operational slip-up led security researchers to an attacker associated with Nigerian letter scams and malware distribution, after he infected himself with Agent Tesla.
The same attack that allowed a threat actor to steal data from private Heroku GitHub repositories also resulted in the compromise of customer credentials, the company now says.
Operation CuckooBees uncovered the state-sponsored group's sophisticated new tactics in a years-long campaign that hit more than 30 tech and manufacturing companies.
QNAP and Synology say flaws in the Netatalk fileserver allow remote code execution and information disclosure.
Flaws gave attackers a way to access other cloud accounts and databases, security vendor says.
The war in Ukraine appears to have triggered a change in mission for the APT known as Bronze President (aka Mustang Panda).