Sophisticated Android-based botnet a danger to enterprise networks
A new, more sophisticated and more stealthy version of the NotCompatible Android Trojan continues to strengthen one of the most long-lived and advanced mobile botnets ever to …
Attackers shellshock, take over devices running on BusyBox
ShellShock, the remote code execution bug (CVE-2014-6271) affecting GNU Bash, the command interpreter present on many Unix systems and Linux distributions, is still being …
Apple updates XProtect to kill iWorm botnet threat
Apple has released an update for its XProtect anti-malware system which makes it detect three different version of the iWorm OS backdoor malware discovered last week by AV …
New OS X backdoor malware roping Macs into botnet
New malware targeting Mac machines, opening backdoors on them and roping them into a botnet currently numbering around 17,000 zombies has been spotted and analyzed by malware …
Mitigations for Spike DDoS toolkit-powered attacks
Akamai Technologies released, through the company’s Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory that alerts …
HealthCare.gov breach affected test server, not users
A server within the Healthcare.gov system has been compromised, but the good news is that it didn’t contain consumer personal information. It was just a development …
Linux systems infiltrated and controlled in a DDoS botnet
Akamai Technologies is alerting enterprises to a high-risk threat of IptabLes and IptabLex infections on Linux systems. Malicious actors may use infected Linux systems to …
Kelihos botmasters target Russian patriots to expand botnet
The cyber crooks behind the Kelihos botnet are, once again, trying to swell the number of computers included in it. They are trying a novel approach: posing as a …
New Gameover Zeus variant steadily rebuilds downed botnet
It’s already widely known that the Gameover Zeus gang, whose activity has been temporarily foiled by a successful multi-national law enforcement takedown in June, is …
The weak links in an increasingly dynamic threat landscape
The Cisco 2014 Midyear Security Report, released today at Black Hat, examines the “weak links” in organizations – outdated software, bad code, abandoned …
Mayhem malware ropes Linux, UNIX servers into botnets
A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the …
Botnets gain 18 infected systems per second
“According to industry estimates, botnets have caused over $9 billion in losses to US victims and over $110 billion in losses globally. Approximately 500 million …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)