Byline / Apr 3, 2018
People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.
Blog / Feb 15, 2018
As the black-market price for stolen data declines, attackers turn to cryptojacking schemes to maximize their profits—all at your expense.
Blog / Jan 10, 2018 (MODIFIED: Jan 15, 2018)
Every week, another bug, vulnerability, or exploit is released—we need a multi-layered security strategy to deal with threats like Spectre and Meltdown.
Article / Jan 3, 2018 (MODIFIED: Jan 25, 2018)
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
Article / Dec 15, 2017 (MODIFIED: Jan 18, 2018)
Zealot Apache Struts campaign targets vulnerabilities in Windows, Linux, and DotNetNuke, then uses leaked NSA exploits to mine Monero on internal networks.
Blog / Jun 27, 2017 (MODIFIED: Aug 9, 2017)
Recent NSA, CIA leaks expose advanced techniques for building automated malware factories that create SambaCry-like threats that deploy over untraceable networks.
Article / Jun 13, 2016 (MODIFIED: Jul 6, 2017)
DDoS attacks have been common since the late 2000s, but average attack peaks have increased to 100+ Gbps.
Article / Jun 1, 2016 (MODIFIED: Jul 6, 2017)
Anonymous commoditizes well-known DDoS attacks by making easy-to-use tools, available to even the most unsophisticated user.
Report / Dec 14, 2015 (MODIFIED: Jul 6, 2017)
Standard mobile banking trojans post their own fraudulent content over banking applications. Yasuo-Bot goes further.
Report / Oct 10, 2014 (MODIFIED: Jul 6, 2017)
Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.
Article / Jul 24, 2014 (MODIFIED: Jul 6, 2017)
Despite being around since 2005, perlb0t is still being used against unpatched servers.