Botnets
274 article(s)
🗓 22 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Middle-East
DinDoor malware is breaking new ground by exploiting trusted developer tools like Deno and deceptive MSI installers. Linked to the Iranian Seedworm group, this backdoor uses advanced evasion and a multi-tenant command infrastructure, challenging defenders to rethink what security really means.
🗓 21 Apr 2026 · 👤 KERNELWATCHER · 🌍 Europe
Ukrainian law enforcement has busted a major bot farm in Zhytomyr, blocking nearly 20,000 fake Telegram accounts allegedly sold to Russian intelligence for disinformation and cyberattacks. Inside the operation fueling Russia's shadow war online.
🗓 21 Apr 2026 · 👤 TRUSTBREAKER
PureRAT’s latest campaign hides dangerous malware inside innocent-looking PNG files, using fileless techniques and advanced evasion to compromise Windows systems without leaving a trace.
🗓 21 Apr 2026 · 👤 KERNELWATCHER
A sophisticated PureRAT campaign is using innocent-looking PNG images to deliver fileless malware, bypassing traditional defenses through steganography and advanced Windows exploitation.
🗓 20 Apr 2026 · 👤 TRUSTBREAKER
A stealthy cyber campaign is infecting Windows systems with both Gh0st RAT and CloverPlus adware, giving attackers remote access and ad fraud revenue. Here’s how the attack works—and how defenders can spot it.
🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 Middle-East
A sophisticated DDoS attack disrupted Bluesky, the rising decentralized social network, with an Iran-linked group claiming responsibility. Although user data remained safe, the assault exposes the cyber risks facing next-generation platforms.
🗓 20 Apr 2026 · 👤 TRUSTBREAKER · 🌍 Middle-East
Bluesky, the decentralized Twitter alternative, was knocked offline by a major DDoS attack claimed by a pro-Iran hacktivist group. Here’s how the attack unfolded, what it means for users, and why even decentralized platforms aren’t immune to cyber threats.
🗓 20 Apr 2026 · 👤 KERNELWATCHER · 🌍 North America
A new cybercrime service called FUD Crypt is arming hackers with Microsoft-signed, fully undetectable malware. By abusing Azure Trusted Signing, attackers can deploy persistent backdoors that blend in with legitimate system processes—no coding required.
🗓 20 Apr 2026 · 👤 TRUSTBREAKER
Hackers are exploiting a major flaw in TBK DVRs to unleash Nexcorium, a new Mirai-based botnet capable of large-scale DDoS attacks. Discover how the attack works, what makes Nexcorium dangerous, and why IoT security is more important than ever.
🗓 20 Apr 2026 · 👤 KERNELWATCHER
Hackers are exploiting a critical flaw in TBK DVRs to deploy Nexcorium, a new Mirai botnet variant. This investigation reveals the infection chain, botnet operations, and urgent defense measures for vulnerable IoT devices.