The Latest in IT Security

1

Ukrainian law enforcement authorities on Monday disclosed the arrest of a hacker responsible for the creation and management of a “powerful botnet” consisting of over 100,000 enslaved devices that was used to carry out distributed denial-of-service (DDoS) and spam attacks on behalf of paid customers. The unnamed individual, from the Ivano-Frankivsk region of the country, […]

Read more ...

1

The man, Izzet Mert Ozek, 32, allegedly used the WireX botnet, which consists mainly of compromised Android devices, to orchestrate a DDoS attack targeting the victim company’s website, thus preventing users from completing hotel bookings. The attack took place in August 2017. Headquartered in Chicago, the hospitality company “managed and franchised luxury and business hotels, […]

Read more ...

1

Two newly discovered malicious Android applications on Google Play Store have been used to target users of Brazil’s instant payment ecosystem in a likely attempt to lure victims into fraudulently transferring their entire account balances into another bank account under cybercriminals’ control. “The attackers distributed two different variants of banking malware, named PixStealer and MalRhino, […]

Read more ...


Categories

SUNDAY, JUNE 08, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments