More than six years have passed since the banking Trojan Emotet was first detected. During this time it has repeatedly mutated, changed direction, acquired partners, picked up modules, and generally been the cause of high-profile incidents and multimillion-dollar losses. The malware is still in fine fettle, and remains one of the most potent cybersecurity threats…
VMware has issued a full patch and revised the severity level of the NSA-reported vulnerability to “important.”
The attack, which prevented Translink users from using their metro cards or buying tickets at kiosks, is the second from the prolific threat group just this week.
The struggling retailer’s back-end services have been impacted, according to a report, just in time for the holidays.
A new “TrickBoot” module scans for vulnerable firmware and has the ability to read, write and erase it on devices.
A raft of obfuscation techniques turn the heat up for the hacking-for-hire operation.
Breaking down the true cost of software tools in the context of reverse engineering and debugging may not be as clear-cut as it appears.
Cybercriminals try to steal the credentials of top companies associated with the COVID-19 vaccine supply chain in an espionage effort.
Lookout’s Hank Schless discusses accelerated threats to mobile endpoints in the age of COVID-19-sparked remote working.
The ransomware group pilfered payment-card data and credentials for over a year, before ending with an attack last month that shut down many of the South Korean retailer’s stores.