Similar to other ransomware, Scarabey demands a Bitcoin payment from victims after infecting their system and encrypting all files.
Trend Micro has observed hackers abusing session-replay scripts to view what a victim does on every site they visit during a browsing session.
The FBI has identified four variations of the scam that claimed the recipient has been a victim of a fraud scheme or a cybercrime.
The malware includes a slightly modified Gh0st remote access trojan designed to act as a backdoor that researchers said is "very similar" to attacks linked to the Iron Tiger group.
Smart sex toys made by German company 'Amor Gummiwaren GmbH' contained multiple security vulnerabilities that could let hackers remotely take control of vibrators.
BeeToken has confirmed the phishing attacks, warning users to be wary of emails and Telegram messages asking for funds.
Culture secretary becomes first MP to launch own app, though early reports suggest its privacy policy has significant flaws.
"It is interesting to see a new ransomware being distributed via exploit kits in what so far seems to be a few ongoing campaigns," researchers said.
The bot spreads using the NSA's EternalBlue exploit that was leaked by the hacking group Shadow Brokers in April last year.
A post-Brexit intelligence-sharing agreement is vital to ensure British and European security, the former heads of MI6 and GCHQ have said.
Google Play store riddled with malware and viruses but elite engineers promise work underway to clean up shop.
Experts found that the highest number of leaked credentials, 555,000 credentials, came from the financial sector.
Since it is fileless and uses legitimate system software, researchers say it is "difficult, if not impossible" for companies to detect and block it.
Car-sharing company GoGet's CEO, Tristan Sender, said they did not notify affected customers sooner based on the "strong advice" of NSW police.
The UK government's surveillance regime used by intelligence agencies to collect internet activity and phone records is unlawful, judges ruled Tuesday (30 January).
"Timing is the only thing that links the two so far," a cybersecurity expert said.
"We have observed another instance where a threat actor looks to be using political events to target individuals or organizations within the Palestine region," researchers said.
Lenovo warned that sensitive data stored by the software, including users' Windows login credentials and fingerprint data, is encrypted using a weak algorithm.
Hackers targeted Bitcoin payments of LockerR ransomware, GlobeImposter ransomware, Sigma ransomware and others.
"Mining cryptocurrency through ads is a relatively new form of abuse that violates our policies and one that we've been monitoring actively," a Google representative said.
Scammers pretending to be from Experty sent out a fake pre-ICO announcement email that encouraged users to send money to an Ethereum wallet that wasn't affiliated with the company.
"This should be treated as a call to action to take appropriate steps to protect their ATMs against these forms of attack and mitigate any consequences," ATM vendor NCR said.
Security researchers found that Dridex and BitPaymer ransomware, share several similarities in code and evasion techniques.
Hackers stole over $500m from Coincheck, a major Tokyo-based cryptocurrency exchange, in the biggest cryptocurrency heist to date.
Privacy violations at ride-hailing companies may not be limited to Uber, as multiple sources claimed this week that Lyft staffers have previously spied on passengers.
Around 15 to 30 million people have likely been affected by the new Monero mining campaign, which was launched just four months ago.
The Dutch intelligence agency reportedly gained access to Cozy Bear's networks in 2014 and also located the hacker group's headquarters.
Interestingly, researchers noted that their analysis of the Hide 'N Seek bot revealed it can be leveraged for far more nefarious activities than launching DDoS attacks.
The malicious malware is designed to find and harvest a slew of sensitive data including credentials, browser data and even cryptocurrency wallets
Security experts found the code for the Masuta botnet on the dark web, which led them to link Satori and Masuta.