Security News
Porn-recording feature will likely be used for extortion.
Malware adds ransomware to its malicious bag of tricks.
New campaigns also show modified versions of known payloads.
The attack group shows a moderate level of sophistication, but the stage is set for MuddyWater to take things to the next level.
Seven new modules discovered in VPNFilter further fill in the blanks about how the malware operates and reveals a wider breath of capabilities.
A cybercriminal group focused on stealing payment card data records has been using new tactics, techniques and procedures (TTPs) in attacks observed in 2017 and 2018, IBM X-Force security...
Recent cyberattacks associated with the North Korea-linked Lazarus group have used an evolved backdoor, along with a Remote Controller tool, Trend Micro reports. read more
The Shadow Brokers, a notorious hacking group that leaked several hacking tools from the NSA, is once again making headlines for releasing another NSA exploit—but only to its "monthly dump...