Phishing attempts come with a Microsoft Word document that activates a strain of malicious software, AZORult, which allows attackers to make off with sensitive data.
A hacking group with North Korean ties has been targeting U.S. entities with malicious documents this summer as it works to hide its tracks better, according to…
Dynamic Data Exchange,like mac ros, can be abused by hackers to help them take over a targeted computer. But it's not a vulnerability and there's no fix,…
The technical findings connect a known advanced persistent threat group, codenamed FIN7 by U.S. cybersecurity firm FireEye, to a sophisticated intrusion technique that was detected in a…
A well-funded spy group appears to have recently acquired a highly-sophisticated zero day vulnerability to deploy a remote access trojan, developed by infamous surveillance technology firm FinFisher,…
The hacking group, dubbed OilRig by security researchers and believed to be tied to Iranian intelligence services, utilized a software flaw that allows attackers to execute a…