The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
The new IoT_Reaper botnet has already compromised more than 2 million devices by exploiting existing IoT security flaws.
The cybercriminals behind the Necurs botnet are now taking screenshots of victims' machines to improve the performance of ransomware attacks.
DDoS attacks are larger and more frequent in 2017 than they were just two years ago, new security research has shown.
The traditional slow crescendo of malicious traffic in DDoS attacks is being replaced by a technique that hits organizations in multiple places at once.
IBM X-Force researchers discovered 20 apps in the Google Play Store that deliver mobile malware to unsuspecting Android users.
Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.
Jaff ransomware is a new variant from the authors of Locky. It works in a similar manner, but is much more expensive for its victims.
Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
Just in time for IoT Day, the Mirai botnet is launching attacks with a new trick up its sleeve: a built-in bitcoin mining component.