A fresh exploration of the malware uncovers a new tactic for bypassing security products by abusing a known driver vulnerability | Continue reading
Scammers combine romantic lures with crypto scams, abusing Apple’s ad-hoc app distribution to steal millions from people around the world. | Continue reading
You are probably familiar with the popular practice of “bug bounty” programs in software security, where an organization offers rewards or bounties to security researchers who ethically disclose se… | Continue reading
Cookie and credential stealing malware-as-a-service delivered by dropper-as-a-service now packs a “clipper” to steal crypto-transactions, and can drop other malware. | Continue reading
Criminals abuse a successful chat service to host, spread, and control malware targeting their users. | Continue reading
Friday afternoon ransomware rampage exploited Kaseya update system to spread (and conceal) ransomware rampage. | Continue reading
A collection of malware samples revives a decade-old HOSTS modification trick to block hundreds of websites | Continue reading
As more of the Internet uses Transport Layer Security, analysis of detection telemetry shows the volume of TLS encrypted communications by malware has doubled in a year. | Continue reading
A novel, if not particularly well made, ransomware is spreading to Exchange servers that haven’t been patched against the ProxyLogon exploit | Continue reading
A vulnerability in Windows’ TCP/IP driver handling of IPv6 allows denial of service—and possibly remote code execution. | Continue reading
An aggressive cryptojacker tests new exploits as it rapidly adopts upgraded features | Continue reading
A new ransomware attack method takes defense evasion to a new level—deploying as a full virtual machine on each targeted device to hide the ransomware from view. In a recently detected attack, Ragn… | Continue reading
Customized malware used to compromise physical and virtual firewalls | Continue reading
The Sandboxie technology will live on in the hands of its dedicated users. | Continue reading
A SophosLabs investigation reveals fleeceware app publishers are also operating on Apple’s App Store for iPhones and iPads | Continue reading
The sudden appearance of a new ransomware on a large number of enterprise networks was not the May Day gift anyone wanted | Continue reading