IoT Botnets and DDoS Attacks: Architecting Against Disaster

IoT Botnets and DDoS Attacks: Architecting Against Disaster

Cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on…

View More IoT Botnets and DDoS Attacks: Architecting Against Disaster
Newly discovered cyber-espionage malware abuses Windows BITS service

Newly discovered cyber-espionage malware abuses Windows BITS service

Security researchers have found another instance of a malware strain abusing the Windows Background Intelligent Transfer Service (BITS). The malware appears to be the work…

View More Newly discovered cyber-espionage malware abuses Windows BITS service
Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

At the end of last week, ESET’s security researchers disclosed the discovery of a new strain of malware that takes the trend for sextortion to a new…

View More Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording
Mirai Groups Target Business IoT Devices

Mirai Groups Target Business IoT Devices

More than 30% of Mirai attacks and an increasing number of variants of the malware are going after enterprise IoT devices, raising the stakes for…

View More Mirai Groups Target Business IoT Devices
Botnet Abusing Android Debug Bridge, SSH is Back

Botnet Abusing Android Debug Bridge, SSH is Back

A new cryptocurrency-mining botnet malware is abusing Android Debug Bridge (ADB) and SSH, according to Trend Micro. “This attack takes advantage of the way open…

View More Botnet Abusing Android Debug Bridge, SSH is Back
New Plurox malware is a backdoor, cryptominer, and worm, all packed into one

New Plurox malware is a backdoor, cryptominer, and worm, all packed into one

A new strain of malware has been spotted in the wild by the Kaspersky security team. Named Plurox, this new malware is a cut above…

View More New Plurox malware is a backdoor, cryptominer, and worm, all packed into one
Emotet Made Up 61% of Malicious Payloads in Q1

Emotet Made Up 61% of Malicious Payloads in Q1

The botnet has displaced credential stealers, stand-alone downloaders, and RATs in the overall threat landscape. Emotet, a form of malware previously classified as a banking…

View More Emotet Made Up 61% of Malicious Payloads in Q1
Over 90% of data transactions on IoT devices are unencrypted

Over 90% of data transactions on IoT devices are unencrypted

A new report that looked at millions of connections from IoT devices present on enterprise networks found that over 40% of them do not encrypt…

View More Over 90% of data transactions on IoT devices are unencrypted
Fin7 hacking group targets more than 130 companies after leaders’ arrest

Fin7 hacking group targets more than 130 companies after leaders’ arrest

According to the company’s experts, Fin7 might have extended the number of groups operating under its umbrella; increased the sophistication of its methods; and even…

View More Fin7 hacking group targets more than 130 companies after leaders’ arrest
Top Russian Hacking Group Breaches Three AV Companies

Top Russian Hacking Group Breaches Three AV Companies

A report published today by Advanced Intelligence revealed that three US-based antivirus software vendors have been breached, and a high-profile collective of Russian hackers is claiming…

View More Top Russian Hacking Group Breaches Three AV Companies