Hackers working for the Chinese government are increasingly hiding their attacks behind ready-made networks of hacked routers ...
A Mirai botnet has started exploiting CVE-2025-29635, a year-old command injection vulnerability in discontinued D-Link ...
Old TP-Link router flaw is being abused again The threat actors are building out a botnet named Ballista They are operating ...
China's state-backed groups are now using covert networks of compromised devices to execute attacks in a low-cost, low-risk ...
A majority of China-linked threat actors are using compromised routers and IoT devices worldwide, turning this gear into proxy networks to carry out further intrusions, steal sensitive data, and ...
Masjesu botnet targets IoT devices globally as a DDoS-for-hire service, deliberately avoiding U.S. military networks to survive.
The botnet’s preferred targets include Four-Faith and Neterbit routers or smart home devices. Experts from VulnCheck reported at the end of December that a vulnerability in Four-Faith industrial ...
A newly identified botnet called KadNap has compromised thousands of Asus routers worldwide by exploiting weaknesses in the devices’ remote-access features, turning ordinary home networking equipment ...
CVE-2024-3721 and CVE-2023-33538 exploited in TBK DVRs and EoL TP-Link routers, enabling Mirai variants and DDoS risk.
The allegation, first pushed by Iranian state media and later by foreign outlets and Chinese publications, centers on ...
A relatively new Mirai-based botnet has been growing in sophistication and is now leveraging zero-day exploits for security flaws in industrial routers and smart home devices. Exploitation of ...