According to U.S. government cybersecurity experts, Ryuk ransomware and Trickbot operators are targeting U.S. hospitals and healthcare providers.
A new IoT botnet dubbed Ttint now targets two Tenda router 0-day vulnerabilities to spread a Remote Access Trojan (RAT) based on Mirai botnet source code.
The Internet Crime Complaint Center (IC3) and Federal Bureau of Investigation (FBI) issued a new warning that cyber actors are using banking trojans and fake mobile banking apps to steal…
Security experts discovered LokiBot, a trojan malware, has been impersonating a popular game launcher. As a result, cybercriminals are able to trick users into downloading the fake app and executing the malware on their systems.
A multi-stage downloader trojan dubbed sLoad uses BITS to steal data from compromised systems. Attackers use sLoad to evade anti-malware protections and security monitoring that may not detect activity using these unconventional protocols.
A new Windows trojan dubbed CStealer attempts to steal passwords from Chrome browser. The malware also uses a remote MongoDB server to store the stolen passwords.
A new strain of malware called "HiddenWasp" targeting Linux-based systems has been discovered by researchers.
Cyber criminals have been actively pushing Emotet malware since early November.
A new malware family dubbed NOKKI is being used in politically motivated attacks targeting Russian and Cambodian speaking people and organizations.
US-CERT has published a joint Technical Alert (TA18-201A) warning of a cyber campaign involving Emotet Malware. Malicious activity was observed as recently as this month.