How did OpenClaw become botnet infrastructure so quickly? DataDome analyzes the hijacked AI agents scraping sites at scale ...
Aeternum C2, a native C++ botnet loader, operates on smart contracts on the Polygon blockchain, increasing its resilience.
The Federal Bureau of Investigation issued a public service announcement on June 5, 2025, warning that cybercriminals are actively exploiting everyday smart home devices to conduct illegal operations.
The story you are reading is a series of scoops nestled inside a far more urgent Internet-wide security advisory. The vulnerability at issue has been exploited for months already, and it’s time for a ...
A newly identified botnet loader is shifting command-and-control (C2) operations onto the Polygon blockchain, eliminating the ...
The news comes just weeks after the U.S. announced it went on the offensive against a China-linked botnet operation. The FBI disrupted a botnet operation managed by Russia’s Main Intelligence ...
Botnet Attack Targeted Routers: A Wake-Up Call for Securing Remote Employees’ Hardware Your email has been sent The FBI spotted this state-sponsored attack that highlights how home office setups can ...
Two separate Mirai botnet campaigns are exploiting a critical flaw in a somewhat unlikely target. The Akamai Security Intelligence and Response Team recently observed exploitation of CVE-2025-24016, a ...
The Quad7 botnet is evolving its operation by targeting additional SOHO devices with new custom malware for Zyxel VPN appliances, Ruckus wireless routers, and Axentra media servers. Sekoia has ...
A newly discovered botnet of 13,000 MikroTik devices uses a misconfiguration in domain name server records to bypass email protections and deliver malware by spoofing roughly 20,000 web domains. The ...
Hackers are taking advantage of D-Link home routers left unpatched for a decade and turning them into a newly formed botnet researchers dubbed "Goldoon." The vulnerability allows attackers to execute ...