Behind the war taking place on the ground, there's a cyber-war being waged by shady hacktivists who are increasing their operations both in Eastern Europe and around the world.
Nearly 10 months after it was taken down by authorities in Europe, the US and Canada, the Emotet botnet appears to have returned, with at least one of the bots associated with it being observed by a security firm.
Veteran security researcher Chester Wisniewski says the takedown of the Emotet botnet is to be welcomed but notes that the primary Emotet operators were not apprehended, which meant that they would rebuild new infrastructure and go back to business as usual.
Authorities in a number of European countries, along with the US and Canada, have disrupted the activities of the Emotet botnet.
If the American technology news site ZDNet wishes to write about Linux malware, nobody on this planet (or even an alien) can stop it from doing so. But being one of the bigger tech sites in existence, it would do well to have a closer look at what it publishes instead of providing fodder for people to poke fun at it.
A cryptocurrency-mining botnet known as Lemon Duck has been displaying increased activity since the end of August, researchers from Cisco's Talos Intelligence Group say, adding that while defenders would have spotted this activity, it would not have been noticed by end users.
Researchers at security firm Trend Micro say they have discovered Windows malware that functions both as ransomware and part of a botnet, distributing spam and also copies of itself to other computers.
Credential stuffing is stuffing up the financial services industry, with content attacks, malicious login attempts on the rise with 8.3 billion detected in a recent two month period alone.
Security vendor Palo Alto Labs has discovered two new variants of the Mirai and Gafgyt botnet that it says are targeting a flaw in the Apache Struts Web framework and one in SonicWall's Global Management System.
A new wave of the Mirai botnet has been uncovered by Symantec, leveraging an open-source project that makes it more robust and compatible with multiple architectures and devices.
An Internet-of-Things botnet that initially targeted routers, IP cameras and DVRs, has now spread its wings to cross-platform database solutions and home devices, the security firm Fortinet claims.
A variant of the Mirai botnet is likely to have been used in attacks against one or more companies in the financial sector in January, the security firm Recorded Future claims, pointing out that this is the first time a botnet made up of Internet of Things devices has been used since Mirai.
Three men have pleaded guilty to operating the Mirai botnet which targeted Internet of Things devices last year and one of them has also entered a guilty plea to a charge of launching an attack on Rutgers University.
Two Huawei router models comprise about 90% of the devices that are part of a 100,000-strong botnet using an advanced new strain of the Mirai malware.
New Android malware that poses as an app on the Google Play store and adds compromise devices to a botnet has been discovered by security firm Symantec.
The Necurs email botnet has made a return and, apart from spreading new variants of the Locky ransomware and the Trickybot trojan, also has new functionality that gathers telemetry data from the Windows desktop of its victims.
Mitigation of distributed denial of service attacks in the first 11 months of 2016 by information services vendor Neustar have increased by 40% over the previous year, the company claims in a report.
A Turkish hacker who goes by the handle Mehmet has created what appears to be a game, wherein he awards points and hacking software as prizes to fellow hackers who participate in a DDoS game.
Hacked Internet of Things (IoT) devices are powering massive botnets and cybercriminals are offering DDoS attacks as a service. A total of 900,000 ZyXEL routers took down Deutsche Telekom users last week.
Arrests and searches in five countries have resulted in the takedown of a botnet known as Avalanche that has been behind phishing attacks and about 20 different malware variants over the last decade.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]