Last week on the Labs blog, we talked about GDPR as part of our series in the National Cyber Security Awareness…
Tag: botnet
Five unsettling cyberthreats
Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter…
Tech support scams, stolen data, and botnets
NOTE: thanks to the Wack0lian for research contributions It would seem that scams as a service are a growth business…
Inside Neutrino botnet builder
It is common practice among cybercriminals to sell their products in the form of packages, consisting of: Such packages are commercial…
ILOVEYOU – SPAM
May 6 marked the 15 year anniversary of the infamous ILOVEYOU (Love Letter) email virus. The virus is regarded as the first major…
Unusual Exploit Kit Targets Chinese Users (Part 2)
Recently, our researchers identified a strange exploit kit targeting Chinese domains. In that writeup, we talked about how the exploit kit…
Android Botnets Hop on the TOR Train
Botnet creators have attempted numerous tactics for hiding their presence, traffic and locations of their command and control (CnC) servers. To…
‘SBC’ botnet to blame for Tor traffic surge?
You might have already heard that last month’s traffic within the Tor network saw a significant increase. Over 1.2 million users…
Do You Own A Website? Now Would Be A Good Time to Patch It
WordPress & Joomla! in the bull’s eye If you run your own website – but not Blogger and other free ones…
What are Trojans?
A Trojan (horse) in computer-terms is a type of malware that does not replicate itself. The name is based on the…