IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits 32,263 people reacted IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits By Chao Lei, Zhibin Zhang, Yiheng An and Cecilia Hu June 22, 2023 at 6:00 AM 13 11 min. read
GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers 68,941 people reacted GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers By Siddharth Sharma, Yang Ji, Anmol Maurya and Dongrui Zeng March 10, 2023 at 6:00 AM 18 7 min. read
Mirai Variant V3G4 Targets IoT Devices 68,110 people reacted Mirai Variant V3G4 Targets IoT Devices By Chao Lei, Zhibin Zhang, Cecilia Hu and Aveek Das February 15, 2023 at 6:00 AM 16 9 min. read
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 66,764 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 40 8 min. read
New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305) 42,502 people reacted New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305) By Brock Mammen and Haozhe Zhang August 30, 2021 at 6:00 AM 33 5 min. read
Network Attack Trends: Internet of Threats (November 2020-January 2021) 38,641 people reacted Network Attack Trends: Internet of Threats (November 2020-January 2021) By Lei Xu, Yue Guan and Vaibhav Singhal April 12, 2021 at 10:37 AM 31 8 min. read
Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability 31,970 people reacted Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability By Haozhe Zhang, Vaibhav Singhal, Zhibin Zhang and Jun Du March 17, 2021 at 3:35 PM 28 4 min. read
Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns 69,695 people reacted Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns By Janos Szurdi, Rebekah Houser and Daiping Liu March 2, 2021 at 6:00 AM 71 13 min. read
Case Study: Emotet Thread Hijacking, an Email Attack Technique 74,346 people reacted Case Study: Emotet Thread Hijacking, an Email Attack Technique By Brad Duncan September 23, 2020 at 6:00 AM 28 5 min. read
3 Vulnerabilities Found on AvertX IP Cameras 37,211 people reacted 3 Vulnerabilities Found on AvertX IP Cameras By Asher Davila July 17, 2020 at 9:00 AM 43 6 min. read
Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding 37,817 people reacted Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding By Asher Davila and Yang Ji May 18, 2020 at 9:10 AM 62 6 min. read
Studying How Cybercriminals Prey on the COVID-19 Pandemic 55,932 people reacted Studying How Cybercriminals Prey on the COVID-19 Pandemic By Janos Szurdi, Zhanhao Chen, Oleksii Starov, Adrian McCabe and Ruian Duan April 22, 2020 at 6:00 AM 46 19 min. read
Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices 69,970 people reacted Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices By Cong Zheng, Yang Ji and Asher Davila January 21, 2020 at 6:00 AM 59 6 min. read
Home & Small Office Wireless Routers Exploited to Attack Gaming Servers 51,186 people reacted Home & Small Office Wireless Routers Exploited to Attack Gaming Servers By Asher Davila October 31, 2019 at 6:00 AM 49 9 min. read
Muhstik Botnet Exploits the Latest WebLogic Vulnerability for Cryptomining and DDoS Attacks 48,878 people reacted Muhstik Botnet Exploits the Latest WebLogic Vulnerability for Cryptomining and DDoS Attacks By Cong Zheng and Yanhui Jia April 30, 2019 at 2:15 PM 13 2 min. read