X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 15/11/2024 19:39

Botnet exploits GeoVision zero-day to install Mirai malware

A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks. [...]

Articles similaires

Sorry! Image not available at this time

Kimwolf Android botnet abuses residential proxies to infect internal devices

bleepingcomputer.com - 06/Jan 19:15

The Kimwolf botnet, an Android variant of the Aisuru malware, has grown to more than two million hosts, most of them infected by exploiting...

Sorry! Image not available at this time

Kimwolf Android botnet abuses residential proxies to infect internal devices

bleepingcomputer.com - 06/Jan 19:15

The Kimwolf botnet, an Android variant of the Aisuru malware, has grown to more than two million hosts, most of them infected by exploiting...

Sorry! Image not available at this time

Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)

itsecuritynews.info - 16/Jan 15:04

Cisco has finally shipped security updates for its Email Security Gateway and Secure Email and Web Manager devices, which fix CVE-2025-20393, a...

Sorry! Image not available at this time

Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)

itsecuritynews.info - 16/Jan 15:04

Cisco has finally shipped security updates for its Email Security Gateway and Secure Email and Web Manager devices, which fix CVE-2025-20393, a...

Sorry! Image not available at this time

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

factpatrol.com - 12/Jan 11:02

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable...

Sorry! Image not available at this time

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

factpatrol.com - 12/Jan 11:02

A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects to co-opt them into a botnet that’s capable...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

itsecuritynews.info - 14/Jan 13:32

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover...

Sorry! Image not available at this time

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers

securityaffairs.co - 15/Jan 09:25

Lumen’s Black Lotus Labs blocked over 550 C2 servers tied to the AISURU/Kimwolf botnet used for DDoS attacks and proxy abuse. Lumen’s Black Lotus...

Sorry! Image not available at this time

Researchers Breach StealC Infrastructure, Access Malware Control Panels

itsecuritynews.info - 17/Jan 05:32

Criminal infrastructure often fails for the same reasons it succeeds: it is rushed, reused, and poorly secured. Security researchers recently...