F-Secure's latest Threat Report highlights concerns that the force behind CryptoLocker ransomware was disabled but not destroyed.
The new malware program is an OS X version of a Windows backdoor called XSLCmd, researchers from FireEye said.
A server connected to Healthcare.gov had botnet malware on it, but the malicious code was never used and no personal information was compromised.
New attacks with the Angler exploit kit inject code directly in browser processes without leaving files on disk, a researcher found.
The gang behind this dangerous ransomware program has earned US$1 million so far, researchers from Dell SecureWorks said
The number of vulnerabilities could reach a three-year low in 2014, but correctly assessing their risk can be hard, IBM researchers said
Backoff malware is stealing credit card details, according to a cybersecurity alert
It sounds like a pretty ominous security exploit, but it sure doesn't look easy to pull off.
More types of malicious software will be identified by Google's safe browsing service
Symantec finds most malware doesn't quit if it runs on VM, which used to be a sign it was being analyzed.