Skip to content
Technology Security Information
  • Home
  • News
  • Security
  • Cyber Security
  • Threats

Mirai Variant Opens Tenda, Zyxel Gear to RCE, DDoS

Posted on May 31, 2023
Researchers have observed several cyberattacks leveraging a botnet called IZ1H9, which exploits vulnerabilities in exposed devices and servers running on Linux.
Posted in News

Post navigation

Previous: Eating Disorder Helpline Takes Down Chatbot After Its Advice Goes Horribly Wrong
Next: Airline Asks Passengers to Step on the Scale Ahead of Boarding in Weight Survey

Recent Posts

  • The Vin Diesel ‘Rock ‘Em, Sock ‘Em Robots’ Movie Has a New Writer: Vin Diesel
  • Facebook and Instagram have a new hub to help get hijacked accounts back
  • BRICKSTORM backdoor exposed: CISA warns of advanced China-backed intrusions
  • Netflix Is One Step Closer to Buying Warner Bros.
  • Our Favorite Science Books to Gift This Year

Recent Comments

No comments to show.

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023

Categories

  • Cyber Security
  • News
  • Security
  • Threats
  • Uncategorized

Related Posts

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

  • News

Cybersecurity researchers have disclosed a new type of name confusion…

  • rooter
  • February 14, 2025
  • 1 min read
  • 0

Apple Beefs Up iMessage With Quantum-Resistant Encryption

  • News

The revamped iMessage app uses Apple's new PQ3 post-quantum cryptographic…

  • rooter
  • February 23, 2024
  • 1 min read
  • 0

Open Source AI Models: Perfect Storm for Malicious Code, Vulnerabilities

  • News

Companies pursing internal AI development using models from Hugging Face…

  • rooter
  • February 14, 2025
  • 1 min read
  • 0

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

  • News

A nation-state threat actor with ties to North Korea has…

  • rooter
  • February 13, 2025
  • 1 min read
  • 0
Copyright © 2025 Technology Security Information Theme: Translucent Blog By Adore Themes.