IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
The BASHLITE malware family targets IoT devices to create botnets capable of conducting DDoS attacks. One million endpoint devices were affected.
Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?
Distributed denial-of-service attacks leveraging a new CCTV botnet allowed cybercriminals to continue their barrage of strikes 24/7.
Just a few weeks after the Necurs botnet was shut down for an unknown reason, the threat has made a comeback and is back in operation.
Security researchers noticed a suspicious shutdown of the Necurs botnet, which is causing some disruption in Dridex and Locky campaigns.
The European Union is embracing new methods of botnet detection to fight cybercrime and improve the security of member nations.
The Marcher mobile bot is a new Android malware targeting a long list of banks around the world with app overlay screens and SMS hijacking.
Publicly exposed Slack access tokens could give cybercriminals an easy way to play in corporate networks and cash in big without much effort.