August 10, 2018 Modular Remote Access Trojan Uses Sophisticated Techniques to Evade Detection 1 min read - According to security researchers, a new modular remote access Trojan (RAT) is using several sophisticated techniques to fly under the radar of traditional detection solutions.
Fraud Protection February 8, 2018 Why Device ID May Not Be Enough to Stop Fraud 3 min read - To defeat increasingly sophisticated fraudsters, security teams should pair their fraud detection tools with a device ID spoofing mechanism that automatically adapts to new threats.
Malware November 8, 2017 Overlay RAT Malware Uses AutoIt Scripting to Bypass Antivirus Detection 6 min read - IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
July 13, 2016 ‘Pokemon Go,’ Popular New AR Game, Can Load Malware 2 min read - "Pokemon Go" can load rootkits into devices along with the hot game, which could wreak havoc on individual users and enterprise networks alike.
November 6, 2015 OmniRAT Takes Over Android Devices Through Social Engineering Tricks 2 min read - Cybercriminals could be leveraging remote tools such as OmniRAT to take over Android devices and steal data from unsuspecting victims.
October 9, 2015 New Remote-Access Trojan Skitters Through Security Undetected 3 min read - A new remote-access Trojan (RAT) named Moker has been discovered by security researchers — and has skittered past every security measure used.
November 14, 2014 New Low-Price Malware Tools Raise Security Risks for SMBs 2 min read - New, low-cost malware tools such as Predator Pain and Limitless pose a growing threat to small and midsize businesses (SMBs), according to Trend Micro.
Software Vulnerabilities October 4, 2013 Massive Adobe Breach Puts Organizations at Risk of Zero-Day Exploits 2 min read - Customers are at significant risk due to a recently reported Adobe breach.