This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Exploit kits comprised of ...
When you think you've seen it all, malware authors always find a way to impress you. Today's "that's clever!" moment comes courtesy of a criminal group that's been spreading a new version of the Zeus ...
The RIG exploit kit is now infecting victim's computers with a new ransomware variant called Buran. This ransomware is a variant of the Vega ransomware that was previously being distributed through ...
TA446 used leaked DarkSword on March 26 to target iOS devices, prompting Apple alerts and widening mobile espionage risks.
O-checker: Detection of Malicious Documents Through Deviation from File Format Specifications describes a powerful tool, o-checker, that specializes in identifying documents containing ...
The State Department has placed a bounty of up to $2.5 million on information leading to Volodymyr Kedariya’s arrest. The US Department of State is offering a reward of $2.5 million for information ...