Mirai Botnet Sees Big 2019 Growth, Shifts Focus to Enterprises

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter. Source: https://threatpost.com

July 18, 2019
Read More >>

Backdoor mechanism found in Ruby strong_password library

The developer Tute Costa found a backdoor in the Ruby library during regular security audits before deploying his code in the production environment. The developer Tute Costa found a backdoor in the Ruby library during regular security audits. The dangerous code was used to check the password strength of user-chosen passwords when the library was being […]

The post Backdoor mechanism found in Ruby strong_password library appeared first on Security Affairs.

July 8, 2019
Read More >>

Godlua backdoor, the first malware that abuses the DNS over HTTPS (DoH)

Researchers at Network Security Research Lab of Qihoo 360 discovered a Lua-based backdoor dubbed Godlua that targets both Linux and Windows systems. The peculiarity of this new piece of malware is the ability to communicate with C2 servers via DNS over HTTPS (DoH). The DoH protocol was a new standard proposed in October 2018 and it is […]

The post Godlua backdoor, the first malware that abuses the DNS over HTTPS (DoH) appeared first on Security Affairs.

July 5, 2019
Read More >>

‘Twas the night before

Recently, the United States Cyber Command highlighted several VirusTotal uploads of theirs – and the executable objects relating to 2016 – 2017 NewsBeef/APT33 activity are interesting for a variety of reasons.

July 4, 2019
Read More >>