Security News

Here's a list of proxy IPs to help block KillNet's DDoS bots
2023-02-06 21:00

A free tool aims is helping organizations defend against KillNet distributed-denial-of-service bots and comes as the US government issued a warning that the Russian cybercrime gang is stepping up its network flooding attacks against hospitals and health clinics. At current count, the KillNet open proxy IP blocklist lists tens of thousands of proxy IP addresses used by the Russian hacktivists in their network-traffic flooding events.

HeadCrab bots pinch 1,000+ Redis servers to mine coins
2023-02-04 00:27

A sneaky botnet dubbed HeadCrab that uses bespoke malware to mine for Monero has infected at least 1,200 Redis servers in the last 18 months. "The victims seem to have little in common, but the attacker seems to mainly target Redis servers and has a deep understanding and expertise in Redis modules and APIs as demonstrated by the malware," Asaf Eitani and Nitzan Yaakov reported.

How to protect yourself from bot-driven account fraud
2023-01-13 04:30

Bots continue to evolve and thrive at the expense of companies. Kasada's research shows revenue loss from bot-driven account fraud and web scraping continues to skyrocket, despite companies spending more on bot mitigation solutions every year.

New SHC-compiled Linux malware installs cryptominers, DDoS bots
2023-01-04 22:29

A new Linux malware downloader created using SHC has been spotted in the wild, infecting systems with Monero cryptocurrency miners and DDoS IRC bots. According to ASEC researchers, who discovered the attack, the SHC loader was uploaded to VirusTotal by Korean users, with attacks generally focused on Linux systems in the same country.

San Francisco terminates explosive killer cop bots
2022-12-07 20:00

San Francisco legislators this week changed course on their killer robot policy, banning the police from using remote-control bots fitted with explosives. "This fight isn't over, but we are grateful that the board explicitly banned police robots with deadly force," San Francisco Supervisor Dean Preston said in a statement following Tuesday's decision to send the policy back to the drawing board.

Deal with sophisticated bot attacks: Learn, adapt, improve
2022-12-07 05:00

A computer program known as a "Bot" acts as an agent for a user or another program or mimics human action. Bots are typically used to automate particular tasks so they can be used without specific human instructions.

OpenAI's new ChatGPT bot: 10 dangerous things it's capable of
2022-12-06 12:23

OpenAI's newly unveiled ChatGPT bot is making waves when it comes to all the amazing things it can do-from writing music to coding to generating vulnerability exploits, and what not. Yesterday, BleepingComputer ran a piece listing 10 coolest things you can do with ChatGPT. And, that doesn't even begin to cover all use cases like having the AI compose music for you [1, 2]. Within six days of its launch, ChatGPT surpassed a million users to the extent its servers couldn't keep up.

OpenAI's new ChatGPT bot: 10 coolest things you can do with it
2022-12-05 08:42

From precisely spotting security vulnerabilities in your code, to writing an essay or an entire block of functional code on a whim, to opening portals to another dimension, OpenAI's newly launched ChatGPT is a game changer with its possibilities seeming limited only by your limitedness. Last week, OpenAI research labs unveiled ChatGPT, a chat bot that works from within your web browser-akin to the ones you've seen on websites offering customer support chat.

LockBit affiliate uses Amadey Bot malware to deploy ransomware
2022-11-08 22:56

A LockBit 3.0 ransomware affiliate is using phishing emails that install the Amadey Bot to take control of a device and encrypt devices. The Amadey Bot malware is an old strain capable of performing system reconnaissance, data exfiltration, and payload loading.

Amadey Bot Spotted Deploying LockBit 3.0 Ransomware on Hacked Machines
2022-11-08 14:52

The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. The document contains a malicious VBA macro that, when enabled by the victim, runs a PowerShell command to download and run Amadey.