Report / Mar 13, 2018
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
Report / Nov 16, 2017 (MODIFIED: Jan 4, 2018)
Learn about the tricks attackers use to dupe unsuspecting users and how you can help protect them—and your organization.
Report / Sep 19, 2017 (MODIFIED: Nov 9, 2017)
As enterprises more closely align their security and IT operations, they still struggle to shift their security programs from reactive to proactive.
Report / Jul 13, 2017 (MODIFIED: Nov 2, 2017)
Safeguarding TLS against attack in the quantum computing age will require changes to today’s TLS key exchange algorithms.
Report / May 10, 2017 (MODIFIED: Aug 7, 2017)
With a growth rate of 1,473% in 2016, the hunt for vulnerable IoT devices rages on...
Report / Dec 14, 2015 (MODIFIED: Jul 6, 2017)
Standard mobile banking trojans post their own fraudulent content over banking applications. Yasuo-Bot goes further.
Report / Jun 24, 2015 (MODIFIED: Jul 6, 2017)
Slave is financial malware written in Visual Basic. Since 2015 it has evolved from relatively simple IBAN swapping.
Report / Apr 12, 2015 (MODIFIED: Jul 6, 2017)
Dyre is one of the most sophisticated banking malware agents in the wild.
Report / Oct 15, 2014 (MODIFIED: Jul 6, 2017)
Tinba, also known as "Tinybanker", "Zusy" and "HµNT€R$", is a banking Trojan.
Report / Oct 10, 2014 (MODIFIED: Jul 6, 2017)
Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.