Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers. It also

Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs. According to a blog post by researchers at Qihoo 360 Netlab, hackers are targeting port 3333. This is frequently used for

The world’s largest online marketplace for selling and lauching distributed denial-of-service (DDoS) attacks was shut down this week as part of Operation Power Off, an international investigation into the so-called site. The effort was led by the UK National

GravityRAT, a remote access trojan targeting organisations across India, boats an unusual trick for evading analysis: taking a reading of the target computer’s temperature. The trojan only detonates its payload if the thermal reading is below a certain level, because

Criminals, like carpenters, hate to see a good tool go unused. It’s no surprise, then, that the Mirai botnet has been in action once again, this time in concert with other botnets and with targets in the financial sector. Insikt

A recently observed variant of the TrickBot banking Trojan has added a new module that can lock a victim’s computer for extortion purposes, Webroot reports. First observed in late 2016 and said to be the work of cybercriminals behind the

The United States Computer Emergencies Readiness Team (US-CERT) released a Technical Alert (TA) to warn organizations of North Koreas “Hidden Cobra” activities, particularly a DDoS botnet network. The technical alert was based from the analytic efforts of the FBI and

The Persirai backdoor allows more than 1000 IP camera models to be easily exploited and more than 120,000 devices are vulnerable to this backdoor. The backdoor was first discovered in the late 2016 after being involved in multiple high-profile DDOS