Open source Twittor tool can control botnets via Direct Messages
A security researcher has created a tool that allows botnet masters to control their botnet by simply sending out commands via Twitter accounts.“I mostly wanted to …
Researchers map out hard-to-kill, multi-layered spam botnet
A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems.The botnet is …
Attackers are turning MySQL servers into DDoS bots
Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …
CCTV botnets proliferate due to unchanged default factory credentials
Incapsula researchers have uncovered a botnet consisting of some 9,000 CCTV cameras located around the world, which was being used to target, among others, one of the …
Exposing the most dangerous financial malware threats
Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …
Exposing the most dangerous financial malware threats
“Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems. The most dangerous financial …
UK, US law enforcement agencies disrupt Dridex botnet
The UK’s National Crime Agency is spearheading an onslaught against the Dridex (aka Bugat, aka Cridex) banking malware and the criminals that wield it.“Dridex …
Unexpectedly benevolent malware improves security of routers, IoT devices
At this point in time, the existence of a botnet comprising of tens of thousands of compromised routers and other IoT devices is not news. Nevertheless, this latest one mapped …
XOR DDoS botnet launching attacks from compromised Linux machines
Attackers have developed a botnet capable of 150+ Gbps DDoS attack campaigns using XOR DDoS, a Trojan malware used to hijack Linux systems, according to Akamai.What is XOR …
GameOver Zeus gang boss also engaged in cyber espionage
Cyber crooks and cyber spies are often two distinct categories of attackers, but not always. Years-long research by the FBI, Fox-IT and Crowdstrike revealed that, at least in …
New GamaPoS malware targets US companies
“After dedicating their efforts to swelling the number of computers roped into their malicious net, the masters of the Andromeda botnet are putting it to use by …
Another malware building toolkit leaked, botnets already popping up
“Another malware building toolkit has been leaked, allowing less tech-savvy crooks to generate a fully functional variant of the KINS banking Trojan and to inject its …
Featured news
Resources
Don't miss
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware