A new Mirai botnet variant is targeting smart signage TV and wireless presentation systems commonly used by businesses. Upgraded with 11 new exploits and default credentials for brute-forcing, enterprises are advised to patch immediately.
New malware family Xbash combines multiple threats targeting vulnerable Linux and Microsoft servers. Combining multiple payload capabilities, enterprises are recommended to patch and monitor patching and recovery procedures to mitigate this threat.
New variants of Mirai and Gafgyt botnets were found targeting well-known vulnerabilities using multiple exploits directed at enterprises for possible DDoS attacks, including the flaw used in the 2017 Equifax data breach.
The source code of the Satori internet-of-things (IoT) botnet, pegged as Mirai's successor, was posted online on Pastebin. What does this mean in the IoT threat landscape, and what can users do against it?