Emergent Android banking Trojan shows app overlay attacks are still effective
By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks.
By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks.
The newly discovered Pipka script can delete itself from a website after execution, making it very difficult to detect.
Many phishing websites are now using unique user IDs, giving defenders a signal to detect phishing attacks before they do much damage.
Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.
The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder form them to use credential stuffing.
Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers.
By tracking down bitcoin wallets, researchers estimate that the Sodinokibi creators pocketed at least $4.5 million.
Chinese hackers and intelligence agencies coordinated cyberattacks to gather intellectual property of aerospace firms to gain competitive advantage.
Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware.
Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars.
Researchers were able to achieve amplification rates of up to 15,300%. Some mitigations are possible.
Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack.
The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere.
NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks.
Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.