Threat actors increasingly using malicious URLs, HTTPS domains, file-sharing sites in email attacks, FireEye says.
Impact of FBI's takedown of 15 'booter' domains last December appears to have been temporary.
Early information suggests threat actors gained access to remote monitoring and management tools from Webroot and Kaseya to distribute malware.
Early information suggests threat actors gained access to the managed service provider's remote monitoring and management tools and used them to attack the firm's clients.
Heavily outnumbered and outpaced by their targets, small FBI cybersquads have been quietly notching up major wins against online criminals operating out of home and abroad.
Avast-sponsored study shows wide prevalence of IoT devices, many with weak credentials and other security vulnerabilities.
Agency urges organizations with vulnerable systems to apply mitigations immediately.
When Local File Inclusion attacks are counted, nearly nine in 10 attacks are related to input validation failures, Akamai report shows.
In vulnerability disclosure programs, organizations are paying more in total for XSS issues than any other vulnerability type, HackerOne says.
The Chinese technology giant's enormous product and service footprint gives it access to more data than almost any other single organization, Recorded Future says.
The country's rapid economic growth and other factors are driving an increase in cybercrime and cyber espionage activity.
Investigation of the cybercrime group's attack on an East European bank shows how some attackers require very little time to broaden their access and establish persistence on a network.
Group's constant experimentation and malware changes are complicating efforts for defenders, Kaspersky Lab says.
The increasing number of successful law enforcement actions and prosecutions suggest that cybercriminals have plenty of reason to be looking over their shoulders.
Sudden surge suggests that new actors have stepped up to the plate to replace the old operators.
Switch in tactic is the latest attempt by operators of the prolific banking Trojan to slip past detection mechanisms.
Once again, a high-proportion of the reported flaws have no current fix, according to Risk Based Security.
The FBI and counterparts from other nations say group infected over 41,000 computers with malware that steals banking credentials.
One year later, the EU mandate's biggest impact has been to focus more attention on data protection and privacy, security analysts say.
ScarCruft has evolved into a skilled and resourceful threat group, new research shows.