The NotPetya fallout continues, with global transport and logistics conglomerate Maersk reporting up to $300 million in losses following a June cyber attack.
With the release of its Q2 financial results, pharmaceutical giant Merck is the latest company to report material impact following malware infections.
The Shadow Brokers' new offering of a monthly exploit subscription service poses a threat to just about everyone.
The IoT landscape is becoming a battleground for all manner of malware, with some variants fighting for control of infected devices and authors racing to get their creations onto as many devices as possible.
Researchers have uncovered a new worm that is infecting thousands of IoT devices and trying to take the Mirai botnet’s corner.
By now, you will be aware that the Internet of Things is a thing and that it is an ever-growing network made up of disastrously insecure appliances, vehicles, cameras, and other devices connected to the Internet. What you may not be aware of is that this shadow network is now being used as a weapon to attack web sites with DDoS floods with some of the highest volumes ever seen.
Flash drive-by downloads and malvertising continue to be common attack vectors for malware infections. Here's a look at how these attacks can be detected and stopped based on behavioral characteristics.
Put those hot glue guns away – here’s how to detect and mitigate USB propagating malware.
Dridex keeps coming back with a vengeance - let's take a look at how the malware works and what can be done to stop it.
Today we’re sharing a use case from the DG Lab in which we detected a variant of the CryptoWall 3.0 ransomware by correlating indicators of compromise within system process calls in real time.