GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers 31,183 people reacted GoBruteforcer: Golang-Based Botnet Actively Harvests Web Servers By Siddharth Sharma, Yang Ji, Anmol Maurya and Dongrui Zeng March 10, 2023 at 6:00 AM 14 7 min. read
Mirai Variant V3G4 Targets IoT Devices 48,802 people reacted Mirai Variant V3G4 Targets IoT Devices By Chao Lei, Zhibin Zhang, Cecilia Hu and Aveek Das February 15, 2023 at 6:00 AM 13 9 min. read
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats 61,606 people reacted Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats By Yiheng An, Chao Lei, Adam Robbie, Aveek Das, Zhibin Zhang and Shehroze Farooqi January 24, 2023 at 6:00 AM 36 8 min. read
New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305) 40,922 people reacted New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305) By Brock Mammen and Haozhe Zhang August 30, 2021 at 6:00 AM 32 5 min. read
Network Attack Trends: Internet of Threats (November 2020-January 2021) 37,159 people reacted Network Attack Trends: Internet of Threats (November 2020-January 2021) By Lei Xu, Yue Guan and Vaibhav Singhal April 12, 2021 at 10:37 AM 30 8 min. read
Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability 30,259 people reacted Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability By Haozhe Zhang, Vaibhav Singhal, Zhibin Zhang and Jun Du March 17, 2021 at 3:35 PM 26 4 min. read
Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns 52,131 people reacted Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns By Janos Szurdi, Rebekah Houser and Daiping Liu March 2, 2021 at 6:00 AM 55 13 min. read
Case Study: Emotet Thread Hijacking, an Email Attack Technique 72,113 people reacted Case Study: Emotet Thread Hijacking, an Email Attack Technique By Brad Duncan September 23, 2020 at 6:00 AM 27 5 min. read
3 Vulnerabilities Found on AvertX IP Cameras 34,974 people reacted 3 Vulnerabilities Found on AvertX IP Cameras By Asher Davila July 17, 2020 at 9:00 AM 43 6 min. read
Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding 35,903 people reacted Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding By Asher Davila and Yang Ji May 18, 2020 at 9:10 AM 62 6 min. read
Studying How Cybercriminals Prey on the COVID-19 Pandemic 53,939 people reacted Studying How Cybercriminals Prey on the COVID-19 Pandemic By Janos Szurdi, Zhanhao Chen, Oleksii Starov, Adrian McCabe and Ruian Duan April 22, 2020 at 6:00 AM 46 19 min. read
Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices 67,570 people reacted Muhstik Botnet Attacks Tomato Routers to Harvest New IoT Devices By Cong Zheng, Yang Ji and Asher Davila January 21, 2020 at 6:00 AM 59 6 min. read
Home & Small Office Wireless Routers Exploited to Attack Gaming Servers 49,593 people reacted Home & Small Office Wireless Routers Exploited to Attack Gaming Servers By Asher Davila October 31, 2019 at 6:00 AM 49 9 min. read
Muhstik Botnet Exploits the Latest WebLogic Vulnerability for Cryptomining and DDoS Attacks 47,477 people reacted Muhstik Botnet Exploits the Latest WebLogic Vulnerability for Cryptomining and DDoS Attacks By Cong Zheng and Yanhui Jia April 30, 2019 at 2:15 PM 13 2 min. read
Mirai Compiled for New Processors Surfaces in the Wild By Ruchna Nigam April 8, 2019 at 6:00 AM 4 4 min. read