One key step to protecting at-risk enterprise applications

StrikeForce penetration testing CSC Blogs

Cybercrime is growing, and the perpetrators are becoming more sophisticated. Worse, they’re getting really good at networking – sharing techniques, code and successes that can multiply the effects of an attack exponentially. Just last month, the huge Mirai attack launched a bot army of IoT devices on critical Internet infrastructure that supports big-name websites such […]

IoT botnet attacks continue, copycat emerges

internet of things security CSC Blogs

According to a MalwareMustDie.org blog, a new botnet malware based on a previous DDoS botnet aims to utilize vulnerable devices exploited in the recent IoT botnet Mirai attack. The new creation, dubbed Linux/IRCTelnet, was first identified by researchers at MalwareMustDie.org. It exploits vulnerable IoT devices via hard-coded authentication credentials. This botnet malware is based on the Aidra botnet code and managed […]