The Ursnif banking Trojan began targeting financial institutions in Japan during Q3 2017 and continues to operate in the region as we enter Q4.
Companies in Russia and Ukraine suffered a widespread attack known as Bad Rabbit that directed victims to a Dark Web site to pay for their stolen files.
An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
The new IoT_Reaper botnet has already compromised more than 2 million devices by exploiting existing IoT security flaws.
Security researchers observed a spam campaign that leverages PowerShell's AutoClose feature to deliver a banking Trojan while eluding sandbox detection.
The cybercriminals behind the Necurs botnet are now taking screenshots of victims' machines to improve the performance of ransomware attacks.
Security researchers discovered a new malware attack that exploits Dynamic Data Exchange, an outdated Office feature, to infect corporate devices.
IBM X-Force Research discovered a new variant of Zberp that evades API threat detection tools using a code injection technique it borrowed from Carberp.
A cybergang known as FIN7 has been using OLE command files to spread its malware and identify potential victims for additional phishing attacks.