Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
Security researchers discovered a Windows Trojan that spreads Mirai malware, identifies potential victims and provides an extra boost of processing power.
The botnet malware known as Ragebot, which notably uses IRC to control infected devices, has resurfaced with improved features.
IT leaders must be vigilant when using remote management software. Attackers can exploit these tools to infect devices with malware and build botnets.
Research firm CZ.NIC detected a sharp rise in attacks against Telnet ports, most of which originated from embedded devices, such as DVR installations.
The BASHLITE malware family targets IoT devices to create botnets capable of conducting DDoS attacks. One million endpoint devices were affected.
Cybercriminals are leveraging IoT devices to carry out extremely sophisticated attacks. How do you protect yourself and your organization?
Distributed denial-of-service attacks leveraging a new CCTV botnet allowed cybercriminals to continue their barrage of strikes 24/7.
Just a few weeks after the Necurs botnet was shut down for an unknown reason, the threat has made a comeback and is back in operation.
Security researchers noticed a suspicious shutdown of the Necurs botnet, which is causing some disruption in Dridex and Locky campaigns.