/1 03, 2018
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
/12 15, 2017
New Apache Struts campaign, Zealot, targets vulnerabilities in Windows, Linux, and the DotNetNuke CMS, then leverages leaked NSA exploits to move laterally through internal networks and mine Monero.
/9 01, 2017
As quickly as attackers commandeer IoT devices to build more “thingbots,” they continue to evolve their attack types and functionality.
/3 27, 2017
A common infection vector used by botnet creators is scanning the Internet for web vulnerabilities to exploit for malware or back doors. The advantage of hitting servers over personal consumer devices is the ability to leverage powerful hardware that is...
/2 25, 2016
Like many other financial Trojans, the notorious Dridex malware keeps evolving and strengthening its presence.
/10 10, 2014
Shellshock can take advantage of HTTP headers as well as other mechanisms to enable unauthorized access to Bash.
/7 24, 2014
Despite being around since 2005, perlb0t is still being used against unpatched servers.
Get the latest application threat intelligence from F5 Labs.
Follow us on social media.