Saturday, December 28, 2024

Botnet

Google Disrupt The Glupteba Botnet Controls More Than 1 Million Windows PCs

Google's Threat Analysis Group (TAG) has discovered and disrupted the Glupteba botnet recently that has infected nearly 1 million Windows PCs all over the...

Mozi IoT Botnet Uses Mirai Variants To Target Network Gateways

Microsoft Security Threat Intelligence Center has recently found that the Mozi P2P botnet is continuously attacking IoT devices.It has installed new functions that help...

Infamous Necro Python bot Added new Tools to Improve Its Chances of Infecting Vulnerable Systems

Nowadays, cyberattacks are increasing rapidly, and as per the report, most cybercriminals are using the automatic bot method to perform all kinds of malware...

Hackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets

A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.Mirai is one...

Hackers Spreading Hoaxcalls DDoS Botnet by Exploiting an Unpatched ZyXel RCE 0-Day Bug Remotely

Researchers uncovered a new variant of Hoaxcalls Botnet that spreading through exploiting the unpatched remote code vulnerability that resides in ZyXEL Cloud CNM SecuManager.Zyxel...

New Mozi P2P Botnet Attacks Netgear, GPON, D-Link and Huawei Routers Using Weak Passwords and Some Known Exploits

A new Distributed Hash Table (DHT) protocol based botnet dubbed Mozi attacks routers with weak passwords and known exploits. The botnet appears to be...

Momentum Botnet Attacks Linux Devices and Recruit them as Botnet to Launch DDoS Attacks Using 36 Different Methods

Security researchers from Trend Micro observed a new malware activity targeting devices running the Linux platform, the malware samples found to be connected with...

Roboto Botnet Exploiting Linux Webmin Server RCE Vulnerability To Perform DDoS Attack

A new wave of Roboto Botnet activities being discovered that attack the Linux Webmin servers by exploiting the RCE vulnerability using vulnerability scanning and...