article / mars 27, 2017 (MODIFIED: avr. 20, 2017)

From DDoS to Server Ransomware: APACHE STRUTS 2 - CVE-2017-5638 Campaign

A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumer devices is the ability to leverage powerful hardware that is...

article / févr. 25, 2016 (MODIFIED: janv. 27, 2017)

Dridex BOTnet 220 Campaign: Targeting UK Financials with Webinjects

Like many other financial Trojans, the notorious Dridex malware keeps evolving and strengthening its presence.

report / oct. 10, 2014 (MODIFIED: févr. 22, 2017)

Shellshock: Malicious Bash, Obfuscated perlb0t, Echo Probes, and More

Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.

article / juil. 24, 2014 (MODIFIED: janv. 27, 2017)

perlb0t: Still in the Wild with UDP Flood DDoS Attacks

Despite being around since 2005, perlb0t is still being used against unpatched servers.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.