Botnet
Google Disrupt The Glupteba Botnet Controls More Than 1 Million Windows PCs
Google's Threat Analysis Group (TAG) has discovered and disrupted the Glupteba botnet recently that has infected nearly 1 million Windows PCs all over the...
Botnet
Mozi IoT Botnet Uses Mirai Variants To Target Network Gateways
Microsoft Security Threat Intelligence Center has recently found that the Mozi P2P botnet is continuously attacking IoT devices.It has installed new functions that help...
Botnet
Infamous Necro Python bot Added new Tools to Improve Its Chances of Infecting Vulnerable Systems
Nowadays, cyberattacks are increasing rapidly, and as per the report, most cybercriminals are using the automatic bot method to perform all kinds of malware...
Botnet
Hackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets
A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.Mirai is one...
Botnet
Hackers Spreading Hoaxcalls DDoS Botnet by Exploiting an Unpatched ZyXel RCE 0-Day Bug Remotely
Researchers uncovered a new variant of Hoaxcalls Botnet that spreading through exploiting the unpatched remote code vulnerability that resides in ZyXEL Cloud CNM SecuManager.Zyxel...
Botnet
New Mozi P2P Botnet Attacks Netgear, GPON, D-Link and Huawei Routers Using Weak Passwords and Some Known Exploits
A new Distributed Hash Table (DHT) protocol based botnet dubbed Mozi attacks routers with weak passwords and known exploits. The botnet appears to be...
Botnet
Momentum Botnet Attacks Linux Devices and Recruit them as Botnet to Launch DDoS Attacks Using 36 Different Methods
Security researchers from Trend Micro observed a new malware activity targeting devices running the Linux platform, the malware samples found to be connected with...
Botnet
Roboto Botnet Exploiting Linux Webmin Server RCE Vulnerability To Perform DDoS Attack
A new wave of Roboto Botnet activities being discovered that attack the Linux Webmin servers by exploiting the RCE vulnerability using vulnerability scanning and...