Botnets
260 article(s)
🗓 20 Apr 2026 · 👤 TRUSTBREAKER
A stealthy cyber campaign is infecting Windows systems with both Gh0st RAT and CloverPlus adware, giving attackers remote access and ad fraud revenue. Here’s how the attack works—and how defenders can spot it.
🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 Middle-East
A sophisticated DDoS attack disrupted Bluesky, the rising decentralized social network, with an Iran-linked group claiming responsibility. Although user data remained safe, the assault exposes the cyber risks facing next-generation platforms.
🗓 20 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Middle-East
Bluesky, the decentralized Twitter alternative, was knocked offline by a major DDoS attack claimed by a pro-Iran hacktivist group. Here’s how the attack unfolded, what it means for users, and why even decentralized platforms aren’t immune to cyber threats.
🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 North America
A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.
🗓 20 Apr 2026 · 👤 TRUSTBREAKER
Hackers are exploiting a major flaw in TBK DVRs to unleash Nexcorium, a new Mirai-based botnet capable of large-scale DDoS attacks. Discover how the attack works, what makes Nexcorium dangerous, and why IoT security is more important than ever.
🗓 20 Apr 2026 · 👤 KERNELWATCHER
Hackers are exploiting a critical flaw in TBK DVRs to deploy Nexcorium, a new Mirai botnet variant. This investigation reveals the infection chain, botnet operations, and urgent defense measures for vulnerable IoT devices.
🗓 20 Apr 2026 · 👤 TRUSTBREAKER · 🌍 North America
FUD Crypt has weaponized Microsoft’s trusted signing to deliver invisible, command-enabled malware to paying subscribers. This exposé breaks down the platform’s evasion tactics and what it means for cybersecurity.
🗓 20 Apr 2026 · 👤 KERNELWATCHER
For a year, cybercriminals have tried—and failed—to exploit a critical flaw in discontinued TP-Link routers. Investigate why these attacks keep missing the mark and what it reveals about IoT security risks.
🗓 18 Apr 2026 · 👤 TRUSTBREAKER
Operation PowerOFF exposes over 75,000 users of DDoS-for-hire services, marking a turning point as law enforcement targets not just operators but buyers. The crackdown includes domain seizures, arrests, and direct warnings, aiming to disrupt the booming cybercrime market.
🗓 18 Apr 2026 · 👤 KERNELWATCHER · 🌍 Asia
A newly discovered Mirai variant, Nexcorium, exploits a critical DVR vulnerability to conscript thousands of IoT devices into a DDoS-ready botnet. The Nexus Team’s campaign highlights urgent risks for unpatched smart hardware.
1  
2  
3  
4  
5  
Next »