In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware.
The Jmail Breaker attack leverages an old vulnerability in Joomla! along with a newly found flaw in the mail module.
Today’s financial cyber-rings have corporate insider and management roles — cybercrime is not just just for hackers and coders anymore.
The highly sophisticated operation shares code with the Hermes malware, and may be linked to the Lazarus Group APT actor.
Sloppy Android developers not following security guidelines for external storage opens the door to device takeover and more.
A massive proxy botnet is just the tip of the iceberg, a warning sign of a bigger operation in the works by the Ramnit operators.
A criminal posing as a legitimate website publisher on the AdsTerra online advertising network is using maliciously gathered traffic to deliver victims to exploit kits.
The Feds say Marcus Hutchins is behind both the UPAS Kit backdoor and the Kronos banking trojan.
The move adds to Google’s efforts against malicious apps on the Play store.
Patches are available—and should be applied—that address a critical vulnerability in Windows Search that some are calling the next WannaCry. Others aren’t so ready to do that.