- March 25, 2020Notorious IoT malware Mirai has seen a recent increase in updates as a new variant emerges and a new vulnerability is targeted.
- February 13, 2020Before, the Emotet malware mostly spread through spam campaigns. Now, it can also propagate via Wi-Fi.
- February 07, 2020Trickbot and Emotet were concealed by using text from articles about #Trump and placing them in the file metadata.
- February 05, 2020Vulnerable video surveillance storage systems are exploited by the two Mirai variants, SORA and UNSTABLE.
- January 31, 2020Cybercriminals used the 2019-nCoV scare to trick people into downloading email attachments that carry the Emotet malware.
- December 19, 2019We recap the history and recent campaigns of IoT botnets to help users defend against the different malware competing for control and resources of regular smart devices.
- November 21, 2019A new botnet is being spread among Linux-based servers running the system configuration tool Webmin.
- September 18, 2019The threat actors operating the Emotet malware broke its nearly four-month hiatus by launching a spate of malicious spam emails targeting German-, Italian-, Polish-, and English-speaking users.
- August 08, 2019Another Mirai offshoot spotted: A variant of the Echobot botnet was found using over 50 exploits that lead to remote code execution (RCE), arbitrary command execution, and command injection in internet of things (IoT) devices.