A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations.
Kimwolf is the latest reminder that the most dangerous botnets now grow quietly inside everyday consumer electronics. Security researchers say the Android-based network has already roped in roughly ...
Cybercriminals are constantly evolving their methods, and the latest example of this is the alarming spread of the Vo1d malware botnet. This highly sophisticated malware has now infected 1,590,299 ...
A relatively new Mirai-based botnet has been growing in sophistication and is now leveraging zero-day exploits for security flaws in industrial routers and smart home devices. Exploitation of ...
Aquabotv3 is actively exploiting a known vulnerability in Mitel devices to include them in its botnet, according to Akamai's Security Intelligence and Response Team. A third variant of the Mirai-based ...
In brief: Don't look now, but your video recorder might be part of a massive botnet pulling off record-breaking sustained DDoS attacks. The network involves compromised Shenzhen webcams and DVRs. The ...
In context: CovertNetwork-1658 is a stark reminder of the ongoing cat-and-mouse game between cybersecurity professionals and threat actors. Using compromised devices as part of a botnet also ...
A novel Go-based Linux botnet, dubbed "PumaBot," has been observed targeting Internet of Things (IoT) devices. PumaBot differentiates itself from typical botnets by remotely retrieving a list of ...
The Chinese state threat actor most famously known as Volt Typhoon is staging a significant comeback after its botnet infrastructure was disrupted in a US-led takedown at the beginning of February ...
A cybercriminal group is exploiting vulnerabilities in Internet of Things (IoT) devices and then turning a tidy profit by putting them up for sale on a residential proxy marketplace, where they can be ...
Google is suing the creators of BadBox 2.0, a botnet that infected 10 million off-brand Android devices. The malware often came pre-installed on cheap streaming boxes, tablets, and projectors, mostly ...