Researchers at Trustwave performed a deep dive analysis of BrickerBot malware code to discover potential 0day vulnerabilities or lessons learned to help improve Internet of Things (IoT) security.
As Checkpoint researchers discovered earlier this week, a variant of Mirai malware dubbed Satori was used to attack hundreds of thousands of Huawei home routers in the past several weeks. Now the Satori exploit…
A zero-day remote code execution (RCE) vulnerability in the Huawei home router HG532 has been discovered by Check Point security researchers.
FortiGuard Labs recently discovered that cybercriminals behind VenusLocker ransomware attacks from last year have switched their tactics to now target the cryptocurrency market.
Researchers at Kaspersky Labs have discovered a new Android Trojan dubbed Loapi that has a modular architecture designed to conduct multiple malicious activities.
FireEye's Mandiant spotted new malware called Triton that has targeted a critical infrastructure organization. FireEye discovered the new threat as part of a recent incident response investigation for one if its customers.
McAfee observed an increase in activity in a Trojan downloader dubbed "Emotet" that spreads by emails used to trick victims into downloading a number of malicious payloads to include ransomware, Dridex, Trickbot, Pinkslipbot, and other banking Trojans.
Google security researchers discovered a backdoor family of malware called Tizi that can root Android devices and exploit older vulnerabilities.
The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued a joint technical alert on updated threat intelligence on a remote administration tool (RAT) dubbed FALLCHILL used by the North Korean government.
Researchers from Qihoo 360 Netlab have reported a big uptick in botnet activity targeting internet connected devices made by ZyXEL Communications.