Tag "Botnet"

Back to homepage
Hardware/Network

The many faces and activities of the ever-evolving Necurs botnet

The botnet is primarily used to deliver other malware in different attack campaigns. The Necurs botnet is operated by a Russia-based threat actor group. The powerful Necurs botnet has been

Software

New Mirai variant leverages 11 new exploits and targets smart signage TVs and wireless presentation systems

This new variant now uses 11 new exploits and targets LG Supersign TVs and WePresent WiPG-1000 wireless presentation systems. In addition to using new exploits in its multi-exploit battery, this

Software

November 2018: Most wanted malware exposed

Check Point has published its latest Global Threat Index for November 2018. The index reveals that the Emotet botnet has entered the Index’s top 10 ranking after researchers saw it

Hardware/Network

The state of ICS and IIoT security in 2019

Industrial control systems continue to be soft targets due to poor cyber hygiene. New study identifies what’s wrong and best practices for fixing it.Industrial control systems (ICS) are designed to

Software

The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

The Necurs botnet, a large and well-known spam originator, has become synonymous with cybercrime. Its spam-sending capabilities, through a botnet of a few million infected devices, are frequently dedicated to

Software

Cryptocurrency mining malware increases 86%

McAfee released its McAfee Labs Threats Report September 2018, examining the growth and trends of new cyber threats in Q2 2018. In the second quarter, they saw the surge in cryptomining

Hardware/Network

IoT malware sees major rise

Not even your washing machine is safe from new threats, Kaspersky warns. The number of malware targeting Internet of Things (IoT) devices is ‘snowballing’, Kaspersky Lab’s newest report claims.The company’s

Hardware/Network

What Your Organization Needs To Know To Undergo A Secure Digital Transformation

Just about every company today is going through some type of digital transformation, whether migrating entire departments and data centers to the cloud, opting for cloud-based SaaS solutions over legacy, on-prem software,

Hardware/Network

A game of hide and seek: find out what is lurking in the shadows

Find what is lurking within the far reaches of your corporate network so that you can plug the gaps opened up by the myriad Internet of Things. The trend towards

Software

Retail and finance top the list of vulnerable industries, increasingly targeted with credential threat campaigns

The finance, professional, and information sectors had the highest volume and most variety of malicious activity in Q2 2018, says Rapid7, and the manufacturing sector is steadily getting more and