The operators of the botnet Bunitu are selling access to proxy bots, according to a report from Malwarebytes. The research says that users of particular VPNs may unknowingly be accessing a “criminal infrastructure of infected computers worldwide.”
Following the recent allegations against Hola Better Internet, the CEO and co-founder Ofer Vilenski posted a lengthy blog post on their website.
After taking down the online networks of Xbox Live and PlayStation for a number of days during the holidays, the Lizard Squad started spreading advertisements for their a’la carte DDoS service that could be rented out by the hour, day, or week depending on how much cash you had to drop on a for-hire botnet. Read More
According to a new blog post from famed security researcher Brian Krebs, the DDoS service offered up by the hacking duo Lizard Squad has been compromised, and the identifying information contained within has been leaked as a result.
More than 80 percent of ‘dark net’ traffic is to sites hosting child-abuse content, according to a University of Portsmouth study of Tor ‘hidden services’ websites but some researchers have pointed out possible skewed results in the findings.
This week, the security research group at Palo Alto Networks revealed their annual Threat Landscape Review, which alleges that 80 percent of all global malware traffic in October of this year came from a single place, the ancient, yet still fully functional Asprox botnet.
Just before everyone headed home for Thanksgiving break last week, researchers at the Netherlands-based digital forensics lab Fox IT posted a whitepaper which detailed the results of their investigation into a bug that could affect over 23,000 websites that use the WordPress, Joomla, and Drupal publication platforms to host their own content.
According to a new report released by the mobile software developer Lookout Security, the NotCompatible malware could be the next big threat for enterprise providers in 2015. Though the original build is going on several years old now, the freshest entry, known as NotCompatible.C, has evolved into a beast of infectious proportions that mimics some Read More
Trend Micro’s new research paper sheds light on Limitless and Predator Pain keyloggers, unscrupulous but effective tools that scammers are increasingly making use of. According to Ryan Flores, senior threat researcher, more of these remote access tools are “simple, off-the-shell” offerings that are used to commit email fraud in corporations on a significant scale. The Read More
A group of sophisticated cyber criminals has compromised the Wi-Fi networks of luxury hotels for the past few years to launch malicious attacks against business people in the Asia-Pacific region. Researchers from Kaspersky Lab dubbed the cyber-espionage group as ‘Darkhotel’ and tell us that it operates by injecting malicious codes into the Web portals used Read More