Researchers have come across a new banking Trojan that appears to borrow code from the notorious Zeus.
Dubbed Panda Banker, the threat was discovered in February by Fox IT and later analyzed in detail by experts at Proofpoint.
Researchers have come across a new banking Trojan that appears to borrow code from the notorious Zeus.
Dubbed Panda Banker, the threat was discovered in February by Fox IT and later analyzed in detail by experts at Proofpoint.
Anomali, a security technology firm that offers a SaaS-based cyber security intelligence platform, today announced it has raised $30 million in series C funding. The round, led by Institutional Venture Partners (IVP), brings the total amount raised by the company to more than $56 million since launching in 2013.
Cisco has released software updates to patch several critical and high severity denial-of-service (DoS) vulnerabilities in the company’s Wireless LAN Controller (WLC) products.
FIN6 Hackers Deployed Malware on Thousands of Retail and Hospitality Point-of-Sale Systems
Researchers have been monitoring the activities of a cybercriminal group that appears to have made a significant amount of money by stealing millions of payment card records and selling them on an underground marketplace.
Apple has released its transparency report for the second half of 2015, indicating that it received a total of 1,015 requests for account data from law enforcement agencies in the United States.
Mergers and acquisitions (M&A) can be exciting, offering companies a significant platform for growth. According to the Deloitte M&A Index 2016, global M&A activity reached record-breaking deal values in 2015 at over $4 trillion, with the resulting deals expected to add $1.5 to $1.9 trillion in value to these companies.
Smartphones can be easily tracked by leveraging an old, yet unpatched security vulnerability in global cellular networks, a researcher has demonstrated.
Hackers are Using Increasingly Sophisticated Methods of Cloaking Their Behavior When Breaching Networks