The economics of hacking: Change your thinking
If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is …
Attackers opt for discreet methods to spy inside the network
For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs …
Linux Mint hack: Backdoored ISOs, stolen forums database
The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …
Dridex botnet alive and well, now also spreading ransomware
Last October’s disruption of the Dridex botnet by UK and US law enforcement agencies and the arrest of a Moldovan bot master have not lead to the death of the botnet. …
Someone hijacked the Dridex botnet to deliver Avira AV’s installer
After last September’s arrest of an alleged member of the gang that has been developing and spreading the Dridex banking malware, and last October’s temporary …
Rise of automation: Battle of the bots
As outlined in the Global Application and Network Security Report 2015-2016, Radware found that throughout 2015, no industry was immune to cyber attacks, and few were …
Elasticsearch servers actively targeted by botmasters
Elasticsearch is one of the most popular choices when it comes to enterprise search engines.Unfortunately, a couple of remote code execution flaws (CVE-2015-5377, …
Open source Twittor tool can control botnets via Direct Messages
A security researcher has created a tool that allows botnet masters to control their botnet by simply sending out commands via Twitter accounts.“I mostly wanted to …
Researchers map out hard-to-kill, multi-layered spam botnet
A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems.The botnet is …
Attackers are turning MySQL servers into DDoS bots
Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …
CCTV botnets proliferate due to unchanged default factory credentials
Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …
Exposing the most dangerous financial malware threats
Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments