Router botnet tied to Volt Typhoon’s critical infrastructure breaches
The Chinese threat group used the newly discovered KV-botnet, made up of compromised SOHO devices, as a stealth data transfer network during attacks on U.S. and Asian targets.
Complex 'NKAbuse' Malware Uses Blockchain to Hide on Linux, IoT Machines
The multifaceted malware leverages the NKN blockchain-based peer-to-peer networking protocol, operating as both a sophisticated backdoor and a flooder launching DDoS attacks.
Cybersecurity platform vendors say enterprises want to buy fewer solutions from fewer vendors. Omdia research, however, tells a different, more nuanced story.