top of page

Notícias

Invasão

20 de janeiro de 2026

Access broker caught: Jordanian pleads guilty to hacking 50 companies

A Jordanian man pleaded guilty in the US to selling illegal access to 50 compromised enterprise networks after an undercover sting. A Jordanian national Feras Khalil Ahmad Albashiti (40), living in Georgia, pleaded guilty in a US court to acting as an access broker, selling unauthorized access to the networks of at least 50 companies. […]

20 de janeiro de 2026

Initial access broker pleads guilty to selling access to 50 corporate networks

A 40-year-old Jordanian man has admitted to selling unauthorized access to computer networks of at least 50 companies, the US Attorney's Office of the District of New Jersey has announced. Feras Khalil Ahmad Albashiti has pleaded guilty last Thursday to fraud and related activity in connection with access devices. “In May 2023, law enforcement officers were investigating an online forum where malware and malicious code was being offered for sale. Albashiti controlled an online moniker … More → The post Initial access broker pleads guilty to selling access to 50 corporate networks appeared first on Help Net Security.

19 de janeiro de 2026

Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Operating as an access broker, the defendant sold unauthorized access to compromised networks to an undercover agent. The post Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks appeared first on SecurityWeek.

16 de janeiro de 2026

RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave

Check Point Research has reported a surge in attacks on a vulnerability in HPE OneView, driven by the Linux-based RondoDox botnet

15 de janeiro de 2026

Lumen disrupts AISURU and Kimwolf botnet by blocking over 550 C2 servers

Lumen's Black Lotus Labs blocked over 550 C2 servers tied to the AISURU/Kimwolf botnet used for DDoS attacks and proxy abuse. Lumen's Black Lotus Labs disrupted over 550 command-and-control servers linked to the AISURU and Kimwolf botnet, a major network used for DDoS attacks and proxy abuse. Acting as a DDoS-for-hire service, Aisuru avoids government […]

14 de janeiro de 2026

Kimwolf botnet's swift rise to 2M infected devices agitates security researchers

The botnet took an unusual path by abusing residential proxy networks, allowing it to control an untapped collection of unofficial Android TV devices. The post Kimwolf botnet's swift rise to 2M infected devices agitates security researchers appeared first on CyberScoop.

13 de janeiro de 2026

GoBruteforcer Botnet Targeting Crypto, Blockchain Projects

The botnet's propagation is fueled by the AI-generated server deployments that use weak credentials, and legacy web stacks. The post GoBruteforcer Botnet Targeting Crypto, Blockchain Projects appeared first on SecurityWeek.

8 de janeiro de 2026

Vulnerability in Asseco AMDX software

An issue allowing unauthorized access to medical records (CVE-2025-4596) was found in Asseco AMDX software.

8 de janeiro de 2026

Who Benefited from the Aisuru and Kimwolf Botnets?

Our first story of 2026 revealed how a destructive new botnet called Kimwolf rapidly grew to infect more than two million devices by mass-compromising a vast number of unofficial Android TV streaming boxes. Today, we'll dig through digital clues left behind by the hackers, network operators, and cybercrime services that appear to have benefitted from Kimwolf's spread.

8 de janeiro de 2026

GoBruteforcer Botnet Targets Linux Servers

The GoBruteforcer botnet has been observed targeting exposed Linux servers on services like FTP and MySQL

bottom of page