An attack that uses the same path names, Java payloads, and Java exploit as one earlier this summer was found leveraging a fake EFF site.
Browsing Category: Malware
U.S. businesses are losing millions in fraudulent wire transfers that have their root in email compromises of accounts belonging to top executives.
Indiana University researchers developed a scanner called MassVet that finds malicious apps hiding in Android markets such as Google Play.
Target officials say that the Securities and Exchange Commission, one of several U.S. agencies investigating the massive data breach at the company in 2013, has decided not to punish Target as a result of the breach.
Details were disclosed about a new remote access Trojan, uWarrior, that comes embedded in a rigged .RTF document.
Researchers at Cisco spotted targeted attacks moving remote access Trojans via the AutoIt administration and scripting tool.
The dismantled AlientSpy remote access Trojan, the same malware found on the phone of dead Argentine prosecutor Alberto Nisman, has resurfaced with new crypto and a new name.
A rash of compromised WordPress websites is behind this week’s surge in Neutrino Exploit Kit traffic
Facebook announced that its ThreatExchange information-sharing platform is closing in on 100 participants and has streamlined its application process.
A SANS ISC report indicates a prominent cybercrime group has begun using the Neutrino Exploit Kit, but that hardly spells the end of the road for the notorious Angler EK.