Botnet
New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices
Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and other countries since late 2024.These commands targeted various companies, which include major Japanese corporations...
Botnet
DigiEver IoT Devices Exploited To Deliver Mirai-based Malware
A new Mirai-based botnet, "Hail Cock Botnet," has been exploiting vulnerable IoT devices, including DigiEver DVRs and TP-Link devices with CVE-2023-1389.The botnet, active since...
Cyber Security News
Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel and the US, have been attributed to the Iranian-backed...
CVE/vulnerability
Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins
Researchers discovered multiple vulnerabilities in Ruijie Networks' cloud-connected devices. By exploiting these vulnerabilities, attackers can remotely compromise access points, gain unauthorized access to internal...
Cyber Security News
Researchers Detailed FrostyGoop Malware Attacking ICS Devices
FrostyGoop, a newly discovered OT-centric malware that exploited Modbus TCP to disrupt critical infrastructure in Ukraine, capable of both internal and external attacks, targets...
Botnet
Water Barghest Botnet Comprised 20,000+ IoT Devices By Exploiting Vulnerabilities
Water Barghest, a sophisticated botnet, exploits vulnerabilities in IoT devices to enlist them in a residential proxy marketplace by leveraging automated scripts to identify...
Botnet
Researchers Detailed Raptor Train Botnet That 60,000+ Compromised Devices
Researchers discovered a large, Chinese state-sponsored IoT botnet, "Raptor Train," that compromised over 200,000 SOHO and IoT devices.Operated by Flax Typhoon, the botnet...
CVE/vulnerability
Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover
Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million IoT-enabled devices.Notably, ThroughTek Kalay's influence emphasizes the importance of protecting...
cyber security
A guide To IoT Security – Protect Your Connected Devices
Living in the digital era, accompanied by technological devices that have become a part of our everyday routine, the IoT is one of the...
cyber security
Live Forensic Techniques To Detect Ransomware Infection On Linux Machines
Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems.Linux ransomware employs diverse encryption methods, evading traditional forensics. Still developing, it shows...
Cyber Attack
10 Most Common Types of Cyber Attacks in 2023
Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:-SoftwareNetworks The rise of the following sophisticated techniques demonstrates a...