SSH-Targeting Golang Bots Becoming the New Norm

SSH-Targeting Golang Bots Becoming the New Norm

Bitdefender researchers have recently found an increasing number of SSH-targeting bots written in Golang. Traditionally, popular malware is written in C, C++ and Perl, and it’s rare that we see attackers creating ...
Radware Threat Researchers Live, episode 2: DDoS and IoT Botnets

Radware Threat Researchers Live: DDoS & IoT Botnets

In the second edition of ‘Researchers Talk Live,’ Daniel Smith and Pascal Geenens geek out on what's current in DDoS and IoT Botnets. The post Radware Threat Researchers Live: DDoS & IoT ...

UK Enterprises to Compete for £70m in Government Cybersecurity Challenge

After 40 percent of UK businesses reported data breaches or security incidents in the past year, the government wants to completely “design out” complex cyber risks and attacks. To achieve this and ...

Bandwidth Security Is Critical in Wake of Rogue IoT Botnets Targeting Telecom Sector

Bandwidth security against rogue IoT botnets could be the next critical investment priority for the telecommunications sector after a report from NOKIA found that 78 percent of network-based malware detection in CSP ...
multi-factor authentication

Two Dozen Click Fraud Apps Found in Google Play

Attackers managed to pass Google’s defenses and place 22 Android apps on Google Play that engaged in sophisticated advertising click fraud when installed on users’ phones. The majority of the apps were ...
Security Boulevard
Adobe Patches Zero-Day Flaw in Flash Player

Adobe Patches Zero-Day Flaw in Flash Player

Adobe Systems fixed a critical vulnerability in Flash Player that was publicly disclosed by a researcher earlier this month. The vulnerability, tracked as CVE-2018-15981, is a type confusion issue that can lead ...
Security Boulevard
Wind River Star Lab

Study: Most Home Routers Have Unpatched Vulnerabilities

A study performed by the non-profit American Consumer Institute (ACI) Center for Citizen Research revealed that the majority of home routers have tens of known vulnerabilities. For its research, the ACI used ...
Security Boulevard
Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Security researchers have uncovered a new botnet targeting Linux-based devices that’s more sophisticated than Mirai and most other IoT botnets observed so far. Researchers from antivirus vendor Avast have dubbed the new ...
Security Boulevard
NVR Software Flaw Threatens Thousands of Devices

NVR Software Flaw Threatens Thousands of Devices

A network video recorder (NVR) application used by organizations from around the world to control surveillance cameras contains a critical vulnerability that could expose devices to hacking. The flaw was found by ...
Security Boulevard
US-CERT Warns About Attacks Against ERP Applications

US-CERT Warns About Attacks Against ERP Applications

The US-CERT arm of the U.S. Department of Homeland Security has issued an alert warning organizations about an increase in attacks targeting Enterprise Resource Planning (ERP) applications. The alert is based on ...
Security Boulevard