Good news: Exploits kits are in decline, thanks to concerted efforts to disrupt their efficacy. Unfortunately, criminals are diversifying their attacks, focusing more on social engineering - including tech-support scams - and malicious spam campaigns.
A new dump from WikiLeaks has revealed an apparent CIA project - code named "CherryBlossom" - that since 2007 has used customized, Linux-based firmware covertly installed on business and home routers to monitor internet traffic and exploit targets' devices.
Microsoft fears that nation-state actors may unleash viral code that could devastate users. On Tuesday, it released software fixes again for its older operating systems in hopes of averting a repeat of last month's infection of tens of thousands of computers with ransomware.
As the cyber threat landscape dramatically changes and cybercriminals become more innovative, organizations in all business sectors need to change their detection and defense strategies, says Tarun Kaura, Symantec's director of solution product management for Asia Pacific and Japan.
Two security firms have investigated what they describe as a malware platform for attacking the industrial control systems that run electricity plants. They warn that the platform was the likely culprit behind the December blackouts in Ukraine.
Former FBI Director James Comey trickled out new details during a Senate Intelligence Committee hearing about what the FBI knew and when regarding Russia's alleged cyber intrusions. We've rounded up the details.
The IT and security domains in the APAC region are witnessing tremendous transformation with the move to digital. And the move from legacy architecture to the cloud is being driven off the backs of smart endpoint devices - of which mobility is one aspect - making it significant in the security narrative in APAC today,...
Russian anti-virus vendor Kaspersky Lab has filed two antitrust complaints against Microsoft in Europe, contending that the company has engineered Windows 10 to favor its preinstalled malware-fighting program, Windows Defender.
A discussion analyzing the difficulty of striking a balance between IT functionality and cybersecurity leads the latest edition of the ISMG Security Report. Also featured: Updates on sizing up weaknesses in biometrics and the potential to exploit LED lights to leak sensitive data from routers.
The Indian Railways' free Wi-Fi network was affected more than any other ISP in India by WannaCry, according to a report from eScan. Some experts say the disruptions could have been avoided if the organization maintained basic security hygiene and blocked its excessive SMB traffic.
Target has reached a record settlement agreement with 47 states' attorneys general over its 2013 data breach. The breach resulted in hackers compromising 41 million customers' payment card details and contact details for more than 60 million customers being exposed.
Police in Europe have arrested 17 suspects as part of an EU-wide investigation into ATM black box attacks, Europol says. These "jackpotting" or "cash-out" attacks use rogue hardware to trick ATMs into dispensing all of their cash on demand.
Lessons India has learned in the aftermath of the global WannaCry ransomware epidemic include the need to overcome poor patching hygiene, widespread use of unlicensed software and a reactive security posture.