Russian police have arrested more suspected members of a cybercrime gang that used "Lurk" malware to steal nearly $30 million from Russian banks. Separately, a lead cybersecurity investigator's arrest on treason charges appears to be chilling cross-border cooperation.
Dozens of banks, governments and telecommunications companies have been struck by fileless malware, which resides in memory and leaves few traces for investigators, according to Kaspersky Lab. The use of open-source tools and utilities makes the attacks difficult to detect.
Exploit kits are out and phishing emails are in for attackers who are attempting to infect victims with ransomware, according to new research. Unfortunately, the volume of phishing - and thus ransomware - attacks continues to grow.
We know why phishing works; we know how it works. And yet the schemes still succeed, and they're only getting more effective. How can we stop phishing? Jim Hansen of PhishMe has some ideas, and they just might surprise you.
A digital forensic analysis of a new type of Mac malware reveals that it has a strong connection to Iran, researchers say. The malware, which turned up on the computer of a human rights advocate, tries to steal authentication details from macOS's Keychain.
In this edition of the ISMG Security Report: an analysis of a major fine against a Texas hospital and its implications for how the Trump administration might enforce HIPAA rules. Also, an IRS-related phishing scheme targets businesses.
InterContinental Hotels Group is warning customers that malware infected point-of-sale devices at a dozen of its hotel restaurants and bars in North America and the Caribbean for up to four months in 2016. But it's unclear if the breach ties to reported exploits involving POS service providers.
The FBI says it's continuing to investigate an international cybercrime ring that stole at least $1.2 million via malware, money mules and overseas bank transfers. So far, one Brooklyn-based man has pleaded guilty to related offenses.
A suburban Dallas police department saw eight years' worth of digital evidence, including material for at least one active criminal case, frozen after a ransomware attack, another example of the continuing havoc caused by file-encrypting malware.
This edition of the ISMG Security Report debunks recent reports suggesting that Austrian hotel guests were locked into - and out of - their rooms by ransomware. Also, would a cybersecurity executive order from U.S. President Donald Trump advance the nation's existing efforts?
Facebook is aiming to make account recovery and password resets more secure with a new, updated approach that eliminates outdated weaknesses such as emailed reset links, SMS messages and security questions.
Offspring of the Zeus banking Trojan continue to spring to life. Functionally, however, security experts say most POS-infecting banking malware remains almost identical. So why aren't more organizations putting well-known defenses in place?
Three Eastern European men have been sentenced to five years in prison for their roles in helping a criminal gang steal $2.7 million from First Commercial Bank ATMs in Taiwan. Europol says two others involved in the thefts have been arrested in cooperation with Belarus and Romanian authorities.
Nearly three years after the Heartbleed bug - and 600,000 vulnerable servers - was discovered, the vulnerability lives on. The latest scans still count 180,000 at-risk servers. Why won't this bug just die?