Hackers use Slack to hide malware communications
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
A group of hackers is using a previously undocumented backdoor program designed to interact with attackers over Slack.
The decade-old Qbot financial malware has resurfaced with an improved version in a new attack that has infected thousands of systems so far.
This concise malware bestiary will help you get your malware terms right when you hang out with geeks - with basic advice for finding and removing malware when you've been hit
“Adversaries are now focusing on new targets to catch less security-mature companies and countries,” says Mark Thomas, group CTO at Dimension Data.
Scammers claim to have video footage of people in compromising positions and they are using it to blackmail them.
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands payment for the decryption key -- and you'll typically get the same answer: "never pay the ransom."
Last week, U.S. Marshals sold off another 50,000 Bitcoins that used to belong to Silk Road founder Ross Ulbricht -- a.k.a. "Dream Pirate Roberts." Ulbricht was found guilty on all accounts last month, and faces up to life in prison.
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
In today’s business environment, branch offices are more important than ever. For the average enterprise, branches generate the vast majority of revenue, but security at the branch is limited, if it exists at all. Learn how to enable secure branch transformation from the branch to cloud edge – without gaps.