Researchers have discovered a versatile cryptominer worm that propagates itself by exploiting vulnerabilities in Microsoft's SMBv1 server, Oracle's WebLogic Server and Apache Struts.
A cryptocurrency mining worm written in the same open-source scripting language used for creating Windows hotkeys and using polymorphism is giving conventional threat detection techniques a run for their money.
With more devices able to connect directly to the web, the IOT s continuously expanding. However, cans of worms are waiting to be opened, including data loss, data manipulation and unauthorised access to devices.
Vitali Kremez reports how the Necurs botnet is delivering a different type of malware that poses a threat specifically to the financial sector: the "Trickbot" banking Trojan.
90 percent of enterprises still recording exploits for vulnerabilities that are more than three years old, and 60 percent for vulnerabilities more than ten years old says Fortinet report, with twice as many attacks at weekends.
Network administrators and computer owners are once again being implored to make sure that they have updated Windows to block a WannaCry-like vulnerability.
Samples of the banking trojan Emotet have begun to surface with the ability to internally propagate, using credential brute-force techniques.
A research team has set up a chain reaction attack that would take over Philips Hue smart lightbulbs across entire cities
ICYMI: McAfee security manager, cybersec salaries, Conficker worm, embedded XP; JD Wetherspoon breach
The latest In Case You Missed It (ICYMI) looks at McAfee security manager failure; 2016 cybersec salaries up; Conficker in 20% of attacks; Embedded XP end-of-life; Wetherspoon breach took 15 mins.
Detected in everything from police body cameras to the business internet of things (IoT) landscape, now do you give a configuration fick?
Couldn't deploy cyber weapons against Pyongyang
Facebook distributing malware is nothing new, nor are shortened URLs for obfuscation, in-the-cloud servers for anonymity or porn as a lure. However the latest Kilim-family variant which hit Facebook last week uses all of them and with a twist: this worm keeps cutting itself in half to evade detection.
Stuxnet was targeted 'inside-out' not 'outside-in' infiltration of air-gapped system says new book.
White hat hacker discloses router vulnerabilities that might only be fixed when new firmware versions are deployed.
"Logic suggests that the NSA is developing its own cyber weapons. It has its own malware, and its own C&C servers" says Sarb Sembhi, Incoming Thought Analyst.
Saudi Arabia and Israel are seeking to disrupt Iran's nuclear programme by using a computer worm more destructive than Stuxnet.