Please turn on your JavaScript for this page to function normally.
U.S. authorities hijack botnet by substituting C&C servers

The U.S. Department of Justice and the FBI have been granted by the federal court the permission to substitute the C&C servers of the massive Coreflood botnet with …

McAfee enhances its Network Security Platform

McAfee announced enhancements to its Network Security Platform which includes: Enhanced botnet control: File and network connection reputation feeds from cloud-based McAfee …

Email malware jumps 400% after Rustock takedown

Malware sent via email increased by 400% in the last week of March 2011, Commtouch reported today. The significant increase was detected two weeks after the takedown of the …

Vulnerabilities surge: 8,000 recorded in 2010

IBM today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly …

Global spam drops by a third as Rustock botnet is dismantled

Symantec analysis reveals that in March, prior to its takedown, the Rustock botnet had been sending as many as 13.82 billion spam emails daily, accounting for an average of …

Rustock’s demise linked to Harnig botnet switch off

Late last week, the Rustock botnet was downed by Microsoft and the US Marshals Service after they received permission from the US District Court for the Western District of …

Rustock botnet downed by Microsoft

As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill. They speculated about the reason behind this …

Tough questions about botnets

ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …

SpyEye botnet activity surges

Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft …

Malware family integration across botnets

Analysis by Symantec reveals that in February, 1 in 290.1 emails (0.345%) was malicious making February among the most prolific time periods both in terms of simultaneous …

Attackers take advantage of emerging technologies

Attackers continue to focus on social engineering attacks and circumventing legacy enterprise security systems, according to Zscaler. Q4 saw shifts in the sources of …

Top 10 botnets of 2010

Damballa’s “Top 10 Botnet Threat Report – 2010” shows a dramatic increase in Internet crime and targeted botnet attacks. At its peak in 2010, the total …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools