Application Security January 11, 2017 Don’t Let Remote Management Software Contribute to Building Botnets 4 min read - IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
September 8, 2016 Telnet Ports Subject to Botnets Using Brute-Force 2 min read - Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
September 1, 2016 BASHLITE Malware Uses IoT for DDoS Attacks 2 min read - The BASHLITE malware family targets IoT devices to create botnets capable of conducting DDoS attacks. One million endpoint devices were affected.
Advanced Threats July 20, 2016 The Threat From Weaponized IoT Devices: It’s Bigger Than You Think! 3 min read - Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?
June 30, 2016 Crooked Cameras? New CCTV Botnet Drives Massive DDoS Attack 2 min read - Distributed denial-of-service attacks leveraging a new CCTV botnet allowed cybercriminals to continue their barrage of strikes 24/7.
June 24, 2016 Necurs Botnet Comes Back From the Dead 2 min read - Just a few weeks after the Necurs botnet was shut down for an unknown reason, the threat has made a comeback and is back in operation.
June 13, 2016 Necurs Botnet Stumbles, Dridex and Locky Feel It 2 min read - Security researchers noticed a suspicious shutdown of the Necurs botnet, which is causing some disruption in Dridex and Locky campaigns.
Government June 9, 2016 Botnet Detection Advances With the Use of Big Data Analysis in Europe 3 min read - The European Union is embracing new methods of botnet detection to fight cybercrime and improve the security of member nations.
Endpoint June 2, 2016 Marcher Mobile Bot Adds UK Targets, Steps Up Banking Fraud Capabilities 5 min read - The Marcher mobile bot is a new Android malware targeting a long list of banks around the world with app overlay screens and SMS hijacking.
May 2, 2016 Public Slack Access Tokens Could Mean Big Compromise for Zero Effort 2 min read - Publicly exposed Slack access tokens could give cybercriminals an easy way to play in corporate networks and cash in big without much effort.