IPv4 Server Hacked in 12 Minutes While IPv6 Server Remained Untouched

IPv4 Server Hacked in 12 Minutes While IPv6 Server Remained Untouched

Compromised IPv4 servers used for DDoS attacks

  • Security
  • By Catalin Cimpanu
  • September 7th, 2016
Botnets of Embedded Devices Are Brute-Forcing Telnet Ports

Botnets of Embedded Devices Are Brute-Forcing Telnet Ports

Attacks from over 120,000 unique IPs detected in June 2016

PNScan Linux Trojan Resurfaces with New Attacks Targeting Routers in India

PNScan Linux Trojan Resurfaces with New Attacks Targeting Routers in India

Linux.PNScan trojan almost died out by the end of 2015

Apocalypse Ransomware Spreads via Unsecured RDP Connections

Apocalypse Ransomware Spreads via Unsecured RDP Connections

Apocalypse coders don't react like gentlemen when an Emsisoft researcher cracks their ransomware, twice

Attackers Used Nearly One Million IPs to Brute-Force a Financial Institution

Attackers Used Nearly One Million IPs to Brute-Force a Financial Institution

ATO attacks are becoming the norm these days

GitHub Resets Some User Passwords After Brute-Force Attack

GitHub Resets Some User Passwords After Brute-Force Attack

Some GitHub users were victims of password reuse

Identity Testing Attacks Are the Latest Trend in Hacking Circles

Identity Testing Attacks Are the Latest Trend in Hacking Circles

Crooks use credentials from public data breaches to break into all of the user's accounts that use those credentials

Researcher Wins $5,000 for Finding Two Ways to Brute-Force Instagram Accounts

Researcher Wins $5,000 for Finding Two Ways to Brute-Force Instagram Accounts

Clever researcher finds 2, not one, ways to break Instagram

Bucbi Ransomware Makes a Comeback After Two Years

Bucbi Ransomware Makes a Comeback After Two Years

Crooks are brute-forcing RDP servers to spread Bucbi

Attackers Brute-Force Corporate RDP Servers to Spread Ransomware

Attackers Brute-Force Corporate RDP Servers to Spread Ransomware

Attackers willing to exploit any network weakness

JavaScript-Based Malware Attacks Your Router's DNS Settings

JavaScript-Based Malware Attacks Your Router's DNS Settings

Malware brute-forces your router with hardcoded credentials

Luxury Retailer Neiman Marcus Says Hackers Breached User Accounts

Luxury Retailer Neiman Marcus Says Hackers Breached User Accounts

Automated attack lets hackers access 5,200 user accounts

New Ransomware Infects Computers via Windows Remote Desktop Services

New Ransomware Infects Computers via Windows Remote Desktop Services

There are some ways to go around the malware's file encryption and recover at least some sensitive files

WordPress XML-RPC Service Used to Amplify Brute-Force Attacks

WordPress XML-RPC Service Used to Amplify Brute-Force Attacks

Hackers are hiding hundreds or thousands of username/password combinations in one single XML-RPC request

Linux-Targeting Malware Sets Up Proxies on Infected Machines

Linux-Targeting Malware Sets Up Proxies on Infected Machines

Duo of Linux trojans used to launch SSH brute-force attacks

  • Security
  • By Catalin Cimpanu
  • September 23rd, 2015
Brute-Forcing URL Shorteners Can Expose Sensitive Corporate Information <em>UPDATE</em>

Brute-Forcing URL Shorteners Can Expose Sensitive Corporate Information UPDATE

Security researcher finds a way to exploit the carelessness of employees who pass sensitive files through URL shorteners

  • Security
  • By Catalin Cimpanu
  • September 16th, 2015
Monitor Worldwide Brute Force Attacks on WordPress Sites with Sucuri's Latest Tool

Monitor Worldwide Brute Force Attacks on WordPress Sites with Sucuri's Latest Tool

Easily track the state of brute force attacks against WordPress websites, worldwide or in our network

 
Want more? Browse: