CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.
Read more on Virus Bulletin’s blog.
Though IPv6 is gradually replacing IPv4 on the Internet’s network layer, email is lagging behind, the difficulty in blocking spam sent over IPv6 cited as a reason not to move. But would we really have such a hard time blocking spam sent over IPv6?
Read more on Virus Bulletin’s blog.
Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.
Read more on Virus Bulletin’s blog.
Security is a top priority for financial institutions around the world. In the past few weeks, the U.K.โs TSB Bank has learned the hard way that availability is even more important. And when availability is an issue, security canโt be ignored.
Read more on Payment Source. (Note: subscription wall.)
Hide'n'Seek IoT botnet adds persistence
The Hide’n’Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.
Read more on Virus Bulletin’s blog.
A new strain of malware that targets cryptocurrency users โ but not users of mainstream payment options like bank accounts โ highlights how much the cybercrime game is changing behind the scenes.
Read more on Payment Source. (Note: subscription wall.)
In April, I attended the RSA Expo in San Francisco. I shared my views on the expo and the industry.
Read more on Virus Bulletin’s blog.
The GravityRAT malware, discovered by Cisco Talos researchers, gives some interesting insight into modern malware development.
Read more on Virus Bulletin’s blog.
How malware can sneak in through M&A
Companies that handle sensitive customer data have even more to worry about when making an acquisition. Not only do they have to be sure the acquired company has good security, but they can’t let their guard down even after the acquisition closes.
Read more on Payment Source. (Note: subscription wall.)
A BGP hijack was used to take over some of Amazon’s DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.
Read more on Virus Bulletin’s blog.