article thumbnail

New Mirai botnet variant V3G4 targets Linux servers, IoT devices

CSO Magazine

A new variant of Mirai — the botnet malware used to launch massive DDoS attacks —has been targeting 13 vulnerabilities in IoT devices connected to Linux servers, according to researchers at Palo Alto Network’s Unit 42 cybersecurity team.

IoT 115
article thumbnail

Linux malware is on the rise—6 types of attacks to look for

CSO Magazine

It is the host operating system for numerous application backends and servers and powers a wide variety of internet of things (IoT) devices. Linux malware has been massively overlooked," says Giovanni Vigna, senior director of threat intelligence at VMware. Linux is a coveted target.

Malware 138
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Akamai CSO Talks Cryptominers, IoT and the Reemergence of Old Threats

Threatpost

Andy Ellis, CSO Akamai, discusses how the company works with others within the cybersecurity landscape to help keep the internet safe.

CSO 44
article thumbnail

Known Vulnerabilities Drove Most Cyberattacks in 2022

Security Boulevard

The data highlights that long-known vulnerabilities frequently cause more destruction than the shiny new ones,” Bob Huber, CSO and head of research, Tenable, said in a release detailing the findings in. The post Known Vulnerabilities Drove Most Cyberattacks in 2022 appeared first on Security Boulevard.

CSO 109
article thumbnail

Top Linux endpoint protection software

CSO Magazine

Mind you, in recent years we've seen an enormous increase in Linux malware. According to security company Crowdstrike, Linux malware increased by 35% in 2021 compared to 2020. Before you tear your hair out keep in mind that the vast majority of these attacks are not targeting Linux servers or cloud instances.

article thumbnail

5 Top Questions About Deception Technology in Cybersecurity

SecureWorld News

In a recent conversation with Michael Meyer, Chief Risk Officer (CRO) and Chief Security Officer (CSO) at MRS BPO, SecureWorld covered the wide world of deception technology and cybersecurity. But now there's IoT, there's medical devices, there's all sorts of different types of servers, PCs, all sorts of different computers. "One

article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

Machine identities are what make hybrid business networks possible; they are nothing less than the key to stitching together emerging IoT- and 5G-centric systems. At the end of the day the CSO the CIO and the CEO all left the company. Machine identities have become the foundation of these attacks, that’s how important they are.

Marketing 133