Please turn on your JavaScript for this page to function normally.
Gold
The economics of hacking: Change your thinking

If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is …

mask
Attackers opt for discreet methods to spy inside the network

For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …

Linux Mint
Linux Mint hack: Backdoored ISOs, stolen forums database

The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …

robot
Dridex botnet alive and well, now also spreading ransomware

Last October’s disruption of the Dridex botnet by UK and US law enforcement agencies and the arrest of a Moldovan bot master have not lead to the death of the botnet. …

Business ideas
Someone hijacked the Dridex botnet to deliver Avira AV’s installer

After last September’s arrest of an alleged member of the gang that has been developing and spreading the Dridex banking malware, and last October’s temporary …

robot
Rise of automation: Battle of the bots

As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …

Elasticsearch servers actively targeted by botmasters

Elasticsearch is one of the most popular choices when it comes to enterprise search engines.Unfortunately, a couple of remote code execution flaws (CVE-2015-5377, …

Open source Twittor tool can control botnets via Direct Messages

A security researcher has created a tool that allows botnet masters to control their botnet by simply sending out commands via Twitter accounts.“I mostly wanted to …

Researchers map out hard-to-kill, multi-layered spam botnet

A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems.The botnet is …

Attackers are turning MySQL servers into DDoS bots

Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …

CCTV botnets proliferate due to unchanged default factory credentials

Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …

Exposing the most dangerous financial malware threats

Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …

Don't miss

Cybersecurity news