Check Point stops bot attacks
Check Point announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). Check Point helps customers discover bots and prevent …
Microsoft takes down Kelihos botnet
After having disrupted the operation of the Waledac and Rustock botnets, Microsoft has set its sights on a smaller one that is thought to be an attempt to rebuild the Waledac …
US DHS asks public to share ideas on botnet mitigation
The U.S. Department of Homeland Security and the U.S. Department of Commerce have issued a public call for comments from “all Internet stakeholders” in order to …
A botnet for the masses
Did you know that you can buy a bot for just 10 Euros? Researchers of German security firm G Data have discovered that a bot builder dubbed “Aldi Bot” is currently …
Pay-per-install services attempt discreet comeback
“Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return,” says McAfee’s …
Russian cyber criminal steals $3.2 millions in 6 months
A Russian resident in his early 20s is believed to be the leader of a tightly knit gang using banking Trojans and money mules to earn themselves millions of dollars. The …
Botnet masters are spreading their resources
With the takedown of the Pushdo/Cutwail, Bredolab and Rustock, the number of “zombified” US computers has decreased so much that the country is no longer …
Bitcoin mining botnet also used for DDoS attacks
A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …
Zeus rival boasts of eluding tracker services, fails
Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …
Internet bad neighborhoods
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over …
Global analysis of 10 million web attacks
Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks …
DDoS bot masquerades as Java update
An especially virulent Trojan variant with DDoS capabilities has been spotted masquerading as a regular Java update and is being served both from legitimate and malicious …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated