Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices

Security researchers have uncovered a new variant of the infamous Mirai Internet of Things botnet, this time targeting embedded devices intended for use within business environments in an attempt to gain control over larger bandwidth to carry out devas… Continue reading Mirai Variant Adds Dozen New Exploits to Target Enterprise IoT Devices

Unusual IoT Botnet Removes Cryptomining Malware from Devices

Security researchers have come across an unusual new botnet that infects Android devices over the debugging interface then searches for and removes cryptocurrency malware. The new botnet, dubbed Fbot by researchers from Qihoo 360’s Netlab team, … Continue reading Unusual IoT Botnet Removes Cryptomining Malware from Devices

Security Boulevard’s 5 Most Read Stories for the Week, August 20-24

A new week, a new crop of security stories. Last week, malware complacency, Russian cyberspies, GDPR compliance and Mirai IoT malware made the headlines. In addition, we analyzed top security threats for web apps. Be sure to check Security Boulevard d… Continue reading Security Boulevard’s 5 Most Read Stories for the Week, August 20-24

Mirai IoT Malware Variant Abuses Linux Cross-Compilation Framework

Researchers have found a malware program based on Mirai that has binaries for many platforms and CPU architectures, allowing it to run even on Linux servers or Android phones. The difficulty of compiling malware that works out of the box on the large … Continue reading Mirai IoT Malware Variant Abuses Linux Cross-Compilation Framework

IoT Botnets Found Using Default Credentials for C&C Server Databases

Not following cybersecurity best practices could not only cost online users but also cost cybercriminals. Yes, sometimes hackers don’t take best security measures to keep their infrastructure safe.

A variant of IoT botnet, called Owari, that relies on… Continue reading IoT Botnets Found Using Default Credentials for C&C Server Databases

Researchers unearth a huge botnet army of 500,000 hacked routers

More than half a million routers and storage devices in dozens of countries have been infected with a piece of highly sophisticated IoT botnet malware, likely designed by Russia-baked state-sponsored group.

Cisco’s Talos cyber intelligence unit have d… Continue reading Researchers unearth a huge botnet army of 500,000 hacked routers

New Mirai Okiru Botnet targets devices running widely-used ARC Processors

The cybersecurity threat landscape has never been more extensive and is most likely to grow exponentially in 2018.

Although the original creators of Mirai DDoS botnet have already been arrested and jailed, the variants of the infamous IoT malware are … Continue reading New Mirai Okiru Botnet targets devices running widely-used ARC Processors

Security Predictions for 2018 Point to Advanced Ransomware and More IoT Threats

  With 2018 just weeks away, we can say with absolute certainty that 2017 hasn’t been a boring year in terms of security incidents. If anything, some malware outbreaks were serious enough to affect almost every country on the map, while dome… Continue reading Security Predictions for 2018 Point to Advanced Ransomware and More IoT Threats

New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina

While tracking botnet activity on their honeypot traffic, security researchers at Chinese IT security firm Qihoo 360 Netlab discovered a new variant of Mirai—the well known IoT botnet malware that wreaked havoc last year.

Last week, researchers notice… Continue reading New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina

Hacker Distributes Backdoored IoT Vulnerability Scanning Script to Hack Script Kiddies

Nothing is free in this world.

If you are searching for free hacking tools on the Internet, then beware—most freely available tools, claiming to be the swiss army knife for hackers, are nothing but a scam.

For example, Cobian RAT and a Facebook hacking tool that we previously reported on The Hacker News actually could hack, but of the one who uses them and not the one you desire to hack.

Continue reading Hacker Distributes Backdoored IoT Vulnerability Scanning Script to Hack Script Kiddies