Article / Jul 16, 2018
Threat actors continue to find creative yet relatively unsophisticated ways to launch new campaigns to reap profits from crypto-mining operations.
Article / Jun 29, 2018
BackSwap demonstrates unique behavior in its manipulation of user input fields and its handling of International Bank Account Numbers (IBANs).
Article / Jun 23, 2018
Attackers continue to find new and creative ways to carry out malicious crypto-mining operations, employing multiple exploits in a single campaign.
Article / Jun 21, 2018
With the vast availability of new exploits and the competition for victims’ resources, the multi-exploit trend continues to be popular among attackers.
Blog / Jun 15, 2018
Singapore saw a sharp rise in attacks targeting a variety of ports, from SIP clear-text (5060), Telnet, SQL, and host-to-host ports to those used for remote router management and proxy servers and…
Article / May 9, 2018
Panda malware is back in full force with three currently active campaigns that extend its targets beyond banking to new industries and organizations worldwide.
Blog / May 4, 2018
US-CERT TL18-106A alert underscores how insecure Internet systems really are and that ignoring the problem only increases the collateral damage.
Article / Apr 12, 2018
Attackers are targeting a Windows IIS vulnerability first disclosed a year ago to mine Electroneum.
Blog / Apr 10, 2018
Critical apps are the ones that must never go down or be hacked. They are also the hardest to defend because they are often massive, ancient, and touch everything.
Article / Apr 6, 2018
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.
Byline / Apr 3, 2018
People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.
Article / Mar 28, 2018
Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.
Blog / Mar 22, 2018
Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.
Report / Mar 13, 2018
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
Byline / Mar 9, 2018
Reaper is just one more blinking light in the faces of the InfoSec community reminding us that we need to get ahead of IOT madness.
Article / Mar 8, 2018
The rTorrent XML-RPC function configuration error targeted to mine Monero in February was also targeted in January in a campaign to spoof user-agents for RIAA and NYU.
Blog / Mar 2, 2018
Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.
Article / Feb 28, 2018
A previously undisclosed misconfiguration vulnerability in the rTorrent client is being exploited in the wild to mine Monero.
Blog / Feb 15, 2018
As the black-market price for stolen data declines, attackers turn to cryptojacking schemes to maximize their profits—all at your expense.
Blog / Feb 8, 2018
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
Blog / Jan 25, 2018 (MODIFIED: Jan 31, 2018)
F5 Labs covered a multitude of threats, vulnerabilities, botnets, attackers, and attacks in 2017. Here are just some of the highlights you might have missed.
Article / Jan 15, 2018 (MODIFIED: Jan 25, 2018)
Ramnit’s latest twist includes targeting the most widely used web services during the holidays: online retailers, entertainment, banking, food delivery, and shipping sites.
Blog / Jan 10, 2018 (MODIFIED: Jan 15, 2018)
Every week, another bug, vulnerability, or exploit is released—we need a multi-layered security strategy to deal with threats like Spectre and Meltdown.
Blog / Jan 4, 2018 (MODIFIED: Jan 18, 2018)
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
Article / Jan 3, 2018 (MODIFIED: Jan 25, 2018)
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
Blog / Dec 28, 2017 (MODIFIED: Jan 16, 2018)
Most security researchers have good intentions, but ethics must play a central role in the decisions they make.