Latest episode – listen now! (And please share with your friends.)
Here’s the latest Naked Security talk – watch now!
As Internet of things (IoT) devices in homes, industrial environments, transportation networks and elsewhere continue to proliferate, so does the attack surface for malicious IoT network attackers. IoT attack activity…
IBM X-Force threat intelligence has been observing a rise in Dridex-related network attacks that are being driven by the Cutwail botnet. Dridex is delivered as a second-stage infector after an…
When a search result looks too good to be true – it IS too good to be true!
New episode – listen now!
Great news from Europol – if you’ve heard of Emotet, you’ll have a good idea how badly things often end for its victims.
Throughout its monitoring, ESET analyzed thousands of malicious samples every month to help this effort
The post ESET takes part in global operation to disrupt Trickbot appeared first on WeLiveSecurity
We found an internet of things (IoT) Mirai botnet downloader exploiting CVE-2020-5902 in the wild, two weeks after getting a 10 out of 10 CVSS rating in its disclosure. Analyzing the said variant, it can also abuse nine other recently discovered security bugs in other devices.
The post Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902 appeared first on .
We have recently detected variants of two existing Linux botnet malware types targeting exposed Docker servers; these are XORDDoS malware and Kaiji DDoS malware. While the XORDDoS attack infiltrated the Docker server to infect all the containers hosted on it, the Kaiji attack deploys its own container that will contain its DDoS malware.
The post XORDDoS, Kaiji Botnet Malware Variants Target Exposed Docker Servers appeared first on .