Malware families evolve on a daily basis, but some updates catch your eye more than others. Necurs has just gone through one of these "interesting" updates, according to US security firm Symantec.
Reports are coming in from multiple security researchers and security firms about increased activity from one of the groups spreading the Locky ransomware.
For the past two and a half months, a WordPress plugin named Display Widgets has been used to install a backdoor on WordPress sites across the Internet.
A malware group is using Facebook's CDN servers to store malicious files that it later uses to infect users with banking trojans.
A virulent spam campaign has hit Facebook Messenger during the past few days, according to recent warnings issued by Avira and Kaspersky Lab.
During the past week, there has been a sudden surge in online extortion campaigns, against regular users and security researchers alike.
A Dark Web service specialized in Jabber/XMPP spam is offering spamées the option of stopping all incoming messages for a small fee of 0.01 Bitcoin, which comes down to around $25.
The Locky ransomware is back, spreading via a massive wave of spam emails distributed by the Necurs botnet, but the campaign appears to be a half-baked effort because the ransomware is not able to encrypt files on modern Windows OS versions, locking files only on older Windows XP & Vista machines.
Security researchers from PhishLabs have come across a new phishing trend that's targeting mobile device owners exclusively, with "the highest proportion of attacks" aimed at Facebook users.
Each day, countless of security researchers are fighting the good fight in an effort to help companies remove malware from infected computers and servers.
For almost four months, script kiddies ran amok in one of Stanford's subdomains, installing web shells, mailers, and other types of web malware.
Today, DocuSign — a provider of e-signature technology — acknowledged a data breach incident following which a third-party managed to gain access to the email addresses of its customers, data that it's now using in massive spam campaigns.
A Twitter user by the name @EugenePupov is trying to take credit for the massive phishing attack that hit Gmail users last night, but currently available evidence isn't lining up with his statements.
A massive phishing campaign took place today, but Google's security staff was on hand and shut down the attacker's efforts within an hour after users first reported the problem on Reddit.
River City Media, an email marketing company that was reported last month as allegedly one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations.
After almost an almost non-existent presence in 2017 and a few weeks off, Locky is back with a fresh wave of SPAM emails containing malicious docs. While it is not known what caused Locky's hiatus, if they plan on pushing the ransomware like they previously did, then we all need to pay close attention.
A new ransomware called Mole was found by security researcher Brad Duncan while he was analyzing a new SPAM campaign. After examining this sample, I feel that this is probably another variant of the CryptoMix family as it has many similarities to the Revenge and CryptoShield variants.
The operators of the Dridex botnet are using the recently disclosed Microsoft Office zero-day to spread a version of their malware, the infamous Dridex banking trojan.
A large SPAM campaign is underway where victims receive an email that pretends to be a requested invoice and contains a password for a password protected encrypted Word document attachment. These password protected word documents contain embedded VBScript files that will download and install the Urlsnif keylogger.