MacOS users, as well as Windows, are in the cross-hairs, especially those based in South Korea.
Researchers are still looking for answers when it comes to LockerGoga’s initial infection method – and what the attackers behind the ransomware really want.
If users have an impacted devices, they need to immediately run a backup of their files and restore their operating system to factory settings, said ASUS
Low-key but effective, steganography is an old-school trick of hiding code within a normal-looking image, where many cybersecurity pros may not think to look.
Attackers can remotely compromise multiple network devices (IP PBX, conferencing gear and IP phones), installing malware and eavesdropping via video and audio functions.
The attack appears to be associated with a China-backed APT actor.
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.
Researchers said 1 million user sessions could have been exposed to the campaign, which downloads the Shlayer trojan.
Experts from Gartner, Lookout and Google talk enterprise mobile security in this webinar replay.
Despite the 2018 crackdown on Fin7, the cybercrime group has been ramping up its efforts with two new malware samples and an attack panel.