Source: virusbulletin.com

Red Eyes threat group targets North Korean defectors - Cyber security news

Red Eyes threat group targets North Korean defectors

Browser attack points still abused by banking trojans - Cyber security news

Browser attack points still abused by banking trojans

Necurs update reminds us that the botnet cannot be ignored - Cyber security news

Necurs update reminds us that the botnet cannot be ignored

EternalBlue: a prominent threat actor of 2017–2018 - Cyber security news

EternalBlue: a prominent threat actor of 2017–2018

Patch early, patch often, but don't blindly trust every 'patch' - Cyber security news

Patch early, patch often, but don't blindly trust every 'patch'

The life story of an IPT – Inept Persistent Threat actor - Cyber security news

The life story of an IPT – Inept Persistent Threat actor

Using Mailchimp makes malware campaigns a little bit more successful - Cyber security news

Using Mailchimp makes malware campaigns a little bit more successful

There are lessons to be learned from government websites serving cryptocurrency miners - Cyber security news

There are lessons to be learned from government websites serving cryptocurrency miners

New paper: A review of the evolution of Andromeda over the years - Cyber security news

New paper: A review of the evolution of Andromeda over the years

Firefox 59 to make it a lot harder to use data URIs in phishing attacks - Cyber security news

Firefox 59 to make it a lot harder to use data URIs in phishing attacks

Ebury and Mayhem server malware families still active - Cyber security news

Ebury and Mayhem server malware families still active

Crypton – exposing malware's deepest secrets - Cyber security news

Crypton – exposing malware's deepest secrets

Transparency is essential when monitoring your users' activities - Cyber security news

Transparency is essential when monitoring your users' activities

Three questions to ask about security product bypasses - Cyber security news

Three questions to ask about security product bypasses

ROPEMAKER email exploit is of limited practical use - Cyber security news

ROPEMAKER email exploit is of limited practical use

Let's not help attackers by spreading fear, uncertainty and doubt - Cyber security news

Let's not help attackers by spreading fear, uncertainty and doubt