Botnet Abusing Android Debug Bridge, SSH is Back

Botnet Abusing Android Debug Bridge, SSH is Back

A new cryptocurrency-mining botnet malware is abusing Android Debug Bridge (ADB) and SSH, according to Trend Micro. “This attack takes advantage of the way open…

View More Botnet Abusing Android Debug Bridge, SSH is Back
New Plurox malware is a backdoor, cryptominer, and worm, all packed into one

New Plurox malware is a backdoor, cryptominer, and worm, all packed into one

A new strain of malware has been spotted in the wild by the Kaspersky security team. Named Plurox, this new malware is a cut above…

View More New Plurox malware is a backdoor, cryptominer, and worm, all packed into one
Emotet Made Up 61% of Malicious Payloads in Q1

Emotet Made Up 61% of Malicious Payloads in Q1

The botnet has displaced credential stealers, stand-alone downloaders, and RATs in the overall threat landscape. Emotet, a form of malware previously classified as a banking…

View More Emotet Made Up 61% of Malicious Payloads in Q1
A Botnet Is Taken Down in an Operation by Microsoft, Not the Government

A Botnet Is Taken Down in an Operation by Microsoft, Not the Government

Microsoft organized 35 nations on Tuesday to take down one of the world’s largest botnets — malware that secretly seizes control of millions of computers…

View More A Botnet Is Taken Down in an Operation by Microsoft, Not the Government
Meet the white-hat group fighting Emotet, the world's most dangerous malware

Meet the white-hat group fighting Emotet, the world’s most dangerous malware

For more than a year, a group of security researchers and system administrators have banded together to fight back against Emotet, today’s most active and…

View More Meet the white-hat group fighting Emotet, the world’s most dangerous malware
IoT Botnets and DDoS Attacks: Architecting Against Disaster

IoT Botnets and DDoS Attacks: Architecting Against Disaster

Cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on…

View More IoT Botnets and DDoS Attacks: Architecting Against Disaster
Newly discovered cyber-espionage malware abuses Windows BITS service

Newly discovered cyber-espionage malware abuses Windows BITS service

Security researchers have found another instance of a malware strain abusing the Windows Background Intelligent Transfer Service (BITS). The malware appears to be the work…

View More Newly discovered cyber-espionage malware abuses Windows BITS service
Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording

At the end of last week, ESET’s security researchers disclosed the discovery of a new strain of malware that takes the trend for sextortion to a new…

View More Nasty New Malware Waits Until You Visit A Porn Site, Then Starts Recording
Mirai Groups Target Business IoT Devices

Mirai Groups Target Business IoT Devices

More than 30% of Mirai attacks and an increasing number of variants of the malware are going after enterprise IoT devices, raising the stakes for…

View More Mirai Groups Target Business IoT Devices