Radware Threat Researchers Live - ep.5 - Bots, Botnets and Games

Radware Threat Researchers Live: Bots, Botnets & Gaming

| | botnet, botnets, Bots, ddos, gaming
In the latest episode of Radware Threat Researchers Live, Daniel Smith and Pascal Geenens discuss what's new in botnets. The post Radware Threat Researchers Live: Bots, Botnets & Gaming appeared first on ...
Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure

Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure

While botnets have been used for anything from performing Distributed Denial-of-Service (DDoS) attacks to stealing data and even sending spam, Bitdefender researchers have found signs that the Interplanetary Storm botnet could be ...
Emotet Botnet Named ‘Most Wanted Malware’ for July 2020

Emotet Botnet Named ‘Most Wanted Malware’ for July 2020

The Emotet botnet earned the title of “most wanted” malware family for the month of July 2020 following a period of inactivity. Check Point revealed that Emotet threat activity had affected 5% ...
Kingminer Botnet Keeps up with the Times

Kingminer Botnet Keeps up with the Times

The e-currency boom in late 2017 sparked a new type of “gold rush”, as cyber-criminals started racing to infect home computers and data centers with crypto-miners. While digital currencies have fluctuated wildly ...
Man sentenced, two others charged, in connection with Satori IoT botnet

Man sentenced, two others charged, in connection with Satori IoT botnet

22-year old man from Vancouver, Washington, has been sentenced to a US federal prison for his role in the development of the Satori botnet, which launched distributed denial-of-service (DDoS) attacks from hijacked ...
SSH-Targeting Golang Bots Becoming the New Norm

SSH-Targeting Golang Bots Becoming the New Norm

Bitdefender researchers have recently found an increasing number of SSH-targeting bots written in Golang. Traditionally, popular malware is written in C, C++ and Perl, and it’s rare that we see attackers creating ...
Akamai

Akamai Discloses Details of Massive DDoS Attack

Akamai this week revealed it mitigated a massive 1.44 terabits-per-second (TBPS) distributed denial of service (DDoS) attack that for nearly two hours reached levels of 385 million packets per second (MPPS). Roger ...
Security Boulevard

Bad Actors Target Unsecure Databases An Average of 18 Times Per Day, New Research Shows

Many companies accidentally leave their databases exposed on the web, and data breaches or security incidents occur daily. Unsecured and misconfigured servers often lead to data leaks that can become logistical and ...
Ghosting Bots: The Story of Hoaxcalls Failures

Ghosting Bots: The Story of Hoaxcalls Failures

The Hoaxcalls campaign has provided a number of opportunities to explore the trials & errors in researching, developing, & building a botnet campaign. The post Ghosting Bots: The Story of Hoaxcalls Failures ...
VictoryGate Monero-Mining Botnet Spread via Infected USB Devices

VictoryGate Monero-Mining Botnet Spread via Infected USB Devices

A previously undocumented botnet called “VictoryGate” propagated via infected USB devices in order to perform Monero-mining functionality. Slovakian security firm ESET revealed that it had sinkholed several command-and-control (C&C) domains so that ...