Microsoft Says Cybercriminals Behind ZeroAccess Have Abandoned the Botnet

Law enforcement agencies acted quickly to mitigate attempts to revive the botnet
by Eduard Kovacs, December 20th, 2013
ChewBacca: Infostealer Malware Uses Tor for C&C Infrastructure

ChewBacca: Infostealer Malware Uses Tor for C&C Infrastructure

by Eduard Kovacs, December 18th, 2013
Kaspersky researchers say the Trojan is not sold publicly
 

CERT Poland Warns of DDOS Botnet Targeting Windows and Linux Machines

Linux machines are likely targeted because they're usually servers with a lot of bandwidth
by Eduard Kovacs, December 18th, 2013
 

MisoSMS Mobile Botnet Used in at Least 64 Spyware Campaigns

FireEye researchers have analyzed the threat and even helped in disrupting it
by Eduard Kovacs, December 16th, 2013
“Advanced Power” Botnet Uses Zombies to Check Websites for SQL Injection

“Advanced Power” Botnet Uses Zombies to Check Websites for SQL Injection

by Eduard Kovacs, December 16th, 2013
Over 12,500 computers have already been infected
 
Want more? Browse: