IBM X-Force researchers discovered 20 apps in the Google Play Store that deliver mobile malware to unsuspecting Android users.
Stantinko malware uses Teddy Protection and The Safe Surfing Chrome extensions to commandeer affected PCs. This sophisticated design can execute any code.
Jaff ransomware is a new variant from the authors of Locky. It works in a similar manner, but is much more expensive for its victims.
Since its initial launch five years ago, the Necurs botnet has quickly ascended the cybercriminal ranks. Today, it controls more than 6 million endpoints.
Just in time for IoT Day, the Mirai botnet is launching attacks with a new trick up its sleeve: a built-in bitcoin mining component.
The IBM X-Force team analyzed the Andromeda malware and determined that its operators have shifted their attention to the payment card industry.
The IBM X-Force team tracked the weaponization of IoT devices and found that the threat of so-called thingbots increased dramatically in 2016.
A distributed DDoS attack can now net fraudsters revenue that any private company would envy: Done right, attackers can reach 95 percent profit margins.
Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
Security researchers discovered a Windows Trojan that spreads Mirai malware, identifies potential victims and provides an extra boost of processing power.