Microsoft: Here's how this notorious botnet used hacked routers for stealthy communication

Microsoft has revealed how the Trickbot trojan botnet has been using compromised MikroTik routers for stealthy communications with infected PCs. Trickbot, known for stealing banking credentials and delivering ransomware, seemed…

From BlackMatter to BlackCat: Analyzing two attacks from one affiliate

By Tiago Pereira with contributions from Caitlin Huey. BlackCat is a recent and growing ransomware-as-a-service (RaaS) group that targeted several organizations worldwide over the past few months. There are rumors…

Gh0stCringe Malware Impacts Unsecured Microsoft SQL, MySQL Servers

Cybercriminals distribute the Gh0stCringe Remote Access Trojan (RAT) on exposed machines by attacking poorly protected Microsoft SQL and MySQL database servers. Researchers from cybersecurity company AhnLab detailed in a report…

Russian Cyclops Blink botnet launches assault against Asus routers

The Cyclops Blink botnet is now targeting Asus routers in a new wave of cyberattacks.  Cyclops Blink, a modular botnet, is suspected of being the creation of Sandworm/Voodoo Bear, a…

SolarWinds Issues Warning on Possible Web Help Desk Instances Attacks

SolarWinds Corporation is a company based in the United States that creates software to assist organizations in managing their networks, systems, and information technology infrastructure. Back in 2020 SolarWinds was…

Landmark Online Safety Bill Introduced to UK Parliament

New obligations will be placed on social media firms to prevent and remove harmful content on their platforms

Cloudflare debuts Friendly Bot validation service

Cloudflare has introduced “Friendly Bots,” a new way to verify an online bot’s identity.  Bots are applications designed to automatically perform specific, repetitive tasks online without the need for human…

'Everyone loses': This new ransomware threatens to wipe Windows PCs if its victims don't pay up

LokiLocker, a relatively new form of ransomware, uses the standard extortion-through-encryption racket but also incorporates disk-wiper functionality.      Double extortion became a hit last year, when ransomware gangs started…

Conversation Hijacking Soars 270% to Enable BEC

A bigger payout encourages threat actors to put more time in

Raspberry Pi Users Urged to Change Default Passwords as Attacks Surge

Honeypot data highlights importance of good IT hygiene