DDoS attacks in Q4 2021
News roundup Q4 2021 saw the appearance of several new DDoS botnets. A zombie network, named Abcbot by researchers, first hit the radar in July, but at the time it was little more than...
News roundup Q4 2021 saw the appearance of several new DDoS botnets. A zombie network, named Abcbot by researchers, first hit the radar in July, but at the time it was little more than...
Though we are recovering from the worst pandemic, cyber threats have shown no sign of downshifting, and cybercriminals are still not short of malicious and advanced ways to achieve their goals. The Global Threat Landscape...
News overview Q3 2021 brought two new DDoS attack vectors, potentially posing a serious threat, including for major web resources. A team of researchers from the University of Maryland and the University of Colorado...
News overview In terms of big news, Q2 2021 was relatively calm, but not completely eventless. For example, April saw the active distribution of a new DDoS botnet called Simps — the name under which it...
The month of April 2021 saw the active distribution of a new DDoS botnet called Simps — the name under which it introduced itself to its victims — that was distributed via YouTube and...
News overview Q1 2021 saw the appearance of two new botnets. News broke in January of the FreakOut malware, which attacks Linux devices. Cybercriminals exploited several critical vulnerabilities in programs installed on victim devices,...
News overview Cybercriminals are constantly on the lookout for means and methods to make attacks more destructive. In Q4 2020, Citrix ADC (application delivery controller) devices became one such tool, when perpetrators abused their DTLS...
More than six years have passed since the banking Trojan Emotet was first detected. During this time it has repeatedly mutated, changed direction, acquired partners, picked up modules, and generally been the cause of...
Drawing minor focus to by themselves, threat actors have spent the earlier two-three several years mass-scanning the online for ENV files that have been accidentally uploaded and remaining exposed on world wide web servers....
News overview Q3 was relatively calm from a DDoS perspective. There were no headline innovations, although cybercriminals did continue to master techniques and develop malware already familiar to us from the last reporting period....
The KashmirBlack botnet has previously productively infected countless numbers of internet sites jogging well known CMS frameworks, which includes Joomla, WordPress, Drupal, and Magneto. Graphic and Write-up Resource backlink Examine a lot more on...
Palo Alto scientists identified 4 new variants of Mirai from two modern assault campaigns. These variants leverage two command injection vulnerability exploits as attack vectors to deliver the malware. Graphic and Post Resource website...
The vicious HEH botnet has come to be the most up-to-date peer-to-peer botnet that is able of wiping each and every piece of details from a selection of IoT units with weakly protected or...
Researchers say that an attacker would be able to stealthily power price tag fluctuations in the services of income, chaos, or both of those, by deploying significant-wattage IoT botnets in a strategic method. Supply...