Please turn on your JavaScript for this page to function normally.
The weak links in an increasingly dynamic threat landscape

The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations – outdated software, bad code, abandoned …

Mayhem malware ropes Linux, UNIX servers into botnets

A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the …

Botnets gain 18 infected systems per second

“According to industry estimates, botnets have caused over $9 billion in losses to US victims and over $110 billion in losses globally. Approximately 500 million …

Financial ransomware now targeting U.S. users

Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …

Relations between spam landscape actors can be leveraged for detection

Since late 2012, a group of researchers from UC Santa Barbara and RWTH Aachen University has been working on finding out the relations that exist between the different actors …

Why botnet takedowns can cause more harm than good

Zeus is a well-known and highly successful crimeware kit – the flat-pack furniture of the virus world. It is under constant development by several criminals or groups …

International action against Gameover Zeus botnet and CyptoLocker ransomware

On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led …

Mobile bad bots running across most top mobile operators

During 2013, Distil Networks fingerprinted and catalogued 2.2 billion bad bots, or 31 percent of the bad bots that exist in Distil’s database of 7-billion bad bots. Bad …

As the World Wide Web turns 25, bots reign supreme

As the World Wide Web turns 25, we’ve just had another reminder of how far we’ve come. On March 10th, just two days before this milestone, Cryptome reported that …

DDoS attack toolkit simplifies the launch of large reflection attacks

Prolexic Technologies issued a high alert DDoS attack threat advisory on the DNS Flooder v1.1 toolkit. The toolkit makes it faster and easier for malicious actors to launch …

Researchers uncover months-old POS malware botnet

With the Target and Neiman Marcus breach being all over the news in the last few weeks, the topic of malware that collects card data directly from Point-of-Sale devices has …

Java-based malware hits Windows, Mac and Linux

Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems – the only thing that it …

Don't miss

Cybersecurity news