Botnets built exclusively from IoT devices have very much become a 'thing - thingbots - and they are now becoming a primary infrastructure for a future darknet according to a report from cybersecurity firm F5 Networks.
International cooperation across all levels of government and law enforcement with those agencies working closely with the cybersecurity industry is the only way to bring down cybercrime operations, an FBI official said at Black Hat 2017.
The security firm Radware has come across two new forms of Denial of Service (DOS) malware that is attacking and bricking Internet of Things devices for as yet unknown reasons.
A newer and more potent version of Mirai malware was used last month to pummel an unnamed U.S. college with a 54-hour long distributed denial of service (DDoS) attack.
Russian national Maxim Senakh agreed to a plea deal on March 28 that could place him in prison for up to five years, paying restitution, and also being fined of up to $250,000 for creating and spreading the Ebury botnet.
As bad bots increasingly take up a greater share of internet traffic, are data centres providing the roads?
Trend Micro is reporting a new threat to Linux-based Internet of Things devices that is specifically able to exploit a specific vulnerability in surveillance cameras made by AVTech.
Cybersecurity researchers MalwareHunterTeam has uncovered a new botnet malware type it has dubbed GhostAdmin that is alive and working in the wild.
With reports of outages to customers of Post Office broadband and TalkTalk, the attack that that nearly a million Deutsche Telekom customers over the weekend appears to have made its way to the UK's shores.
One of Imperva's security researchers has warned of automated registration bots, says "they're great at concealing fraud."
November 21 marks the eighth anniversary of Conficker being discovered and according to researchers at ESET it is still going strong.
An researcher spotted threat actors actively updating and customizing the Mirai botnet source code that was leaked less than two weeks ago.
Flashpoint confirmed some of the devices used in the Dyn DNS attacks which took down more than a dozen websites, including Twitter and Spotify, were DVRs.
SANS Institute researchers are calling on system admins to do their part in securing connected devices.