End of An Era As Kelihos Botnet Operator Jailed
A Russian man pleaded guilty this week to running Kelihos, a botnet that for years helped facilitate a lengthy spam and credential-harvesting campaign.
A Russian man pleaded guilty this week to running Kelihos, a botnet that for years helped facilitate a lengthy spam and credential-harvesting campaign.
Researchers recently discovered a narrowly focused attack that targets iPhone users with data-stealing, location tracking malware.
Researchers warned Wednesday that VPNFilter, the strain of potentially destructive malware uncovered last week, can infect more devices than previously thought. It also has the ability to intercept network traffic and deliver malicious payloads via a man-in-the-middle attack.
The Federal Bureau of Investigation and the Department of Homeland Security on Tuesday released an alert detailing two kinds of malware used by Hidden Cobra, the codename the U.S. has given to the North Korean government's cyberattacks.
The US Federal Bureau of Investigation (FBI) seized control of a server connected to the VPNFilter botnet, a collection of roughly 500,000 hacked routers and network attached storage devices, on Wednesday. It was widely speculated attackers behind the botnet were gearing up for an attack on Ukraine this weekend.
A Chrome extension has been removed from Google's webstore that was found spreading through Facebook, stealing passwords and cryptocurrency.
The leader of the cybercrime gang, which targeted financial transfers dating back to 2013, was recently arrested in Spain.
A breach at one of Applebee's largest franchisees, RMH Franchise Holdings, affected over 160 restaurants late last year.
Coldroot, a new strain of macOS malware that's eluded detection for more than a year has a keylogger and can gain persistence with root privileges.
In the latest episode of the Digital Guardian podcast, Christopher "Tophs" Elisan, Principal Malware Scientist at RSA, describes recent malware trends he's seen, two approaches to thinking about breaches, and the dangers of attributing attacks.