You searched for botnets | SC Media

Your search for botnets returned 45 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove

Your search for botnets returned 45 results

Sort Results:

Relevant Recent
Perspectives

Get ready for the next DDoS attack

When the first DDoS attack took place more than 20 years ago, the intent was to disrupt a university, not necessarily cause economic or physical damage. But it was so successful that we saw repeat attacks on major global websites, including Amazon, Yahoo and CNN. Today, DDoS has become one of the more damaging cyberthreats…
Cybercrime, Malware, Security News

Botnet abuses Docker servers and crypto blockchain to deliver Doki backdoor

As user organizations move more of their business infrastructure off premises, cybercriminals become increasingly motivated to target Linux-based cloud environments, including Docker servers with misconfigured API ports. And while cryptojacking schemes comprise some of the more conventional varieties of these Linux-based malware attacks, researchers have just disclosed the discovery of a Docker container attack that…
Cryptocurrency, Security News

New cryptominer botnet spreads payload, less intrusive

A new cryptocurrency-mining botnet attack called Prometei bypasses detection systems and monetizes its campaigns in less intrusive ways. It is the first time that anyone’s documented a multi-modular botnet, according to Talos, which discovered the botnet and dubbed it “Prometei.” The botnet, which has been active since March, spreads a payload to provide financial benefits…
Executive Insight

5 Ways Web Attacks Will Change Post-COVID

COVID-19 has accelerated changes in the way attackers hit web applications. Based on behaviors we observed during our research, we developed five predictions on how web application security will change as we come out of the COVID-19 period – and what security pros can do about it. 1. More sophisticated account takeover (ATO) attacks. The…
Personal home router
Coronavirus, Data Breach, Privacy & Compliance News and Analysis, Security News

Home routers largely unpatched, raising risk during Covid-19 WFH

Employers who have suddenly shifted a large percentage of their workforce to remote due to Covid-19 no doubt will shudder by the findings of a new Fraunhofer Institute for Communication, Information Processing and Ergonomics study that concluded no home router was without security vulnerabilities. The German tech think tank analyzed 127 home routers from seven…
Ransomware, Security News

‘Mirai’ botnet successors’ co-developer sentenced to 13 months

A 21-year-old man has been sentenced to serve 13 months in federal prison for his role in creating the Satori DDoS botnet, which descended from Mirai IoT malware, announced U.S. Attorney Bryan Schroder in Anchorage, Alaska. Kenneth Currin Schuchman, 22, of Vancouver, Wash., was sentenced today by Chief U.S. District Judge Timothy M. Burgess, after…
Cybercrime, Ransomware, Security News

Evil Corp debuts WastedLocker ransomware and new TTPs, researchers say

Researchers have discovered a new ransomware, WastedLocker, that they are attributing with “high confidence” to the Evil Corp cybercriminal gang, two members of which the U.S. Justice Department charged last December with federal hacking and bank fraud crimes. Evil Corp is historically associated with the banking credentials-stealing Zeus trojan and Bugat (aka Dridex) malware, as well as Locky and…
Events, InfoSec World 2020, Malware, Network Security, Phishing, Security News

Sapphire Software’s Nicholas Takacs asks: Is self-aware malware possible yet?

“Two can play at this game…” Cybersecurity is a non-stop arms race between white hats and malicious hackers, and the three “A’s” — automation, analytics and artificial intelligence — are among the more powerful defensive tools that CISOs can implement to defend their organizations. But cybercriminals can also potentially employ them to magnify their attacks…
IoT, Network Security, Security News, Vulnerabilities

CallStranger bug in billions of devices can enable data exfiltration, DoS attacks

Billions of Internet of Things and Local Area Network devices that rely on the Universal Plug and Play (UPnP) protocol for discovery of and interaction with other devices are vulnerable to “CallStranger,” a bug that can be exploited to exfiltrate data, launch a denial of service attack or scan ports. The Windows 10 operating system,…
Cybercrime, Government, Health Care, Legal, Ransomware, Security News

Alleged Collection 1 hacker nabbed; ransomware campaign targeting hospitals disrupted

The Ukrainian Secret Service on Tuesday announced the arrest of a man who they say is the hacker who amassed hundreds of millions of stolen credentials and then used an internet message board to announce their availability as a data set known as Collection 1. And in another significant win for law enforcement officials, Romania…
Next post in Cybercrime