Automated attacks targeting PHP servers are increasing

Cybersecurity researchers have warned of a significant increase in automated attacks targeting PHP servers, IoT devices, and cloud gateways, driven by botnets like Mirai, Gafgyt, and Mozi. According to a report from Qualys’ Threat Research Unit, these automated attacks exploit known vulnerabilities and inadequate cloud configurations, allowing attackers to take control of exposed systems and thereby expand their botnet networks. Some simple measures to prevent attacks PHP servers have become the main targets of these […]

Cybersecurity researchers have warned of a significant increase in automated attacks targeting PHP servers, IoT devices, and cloud gateways, driven by botnets such as Mirai, Gafgyt, and Mozi. According to a report from Qualys’ Threat Research Unit, these automated attacks exploit known vulnerabilities and inadequate cloud configurations, allowing attackers to take control of exposed systems and thereby expand their botnet networks.

Some simple measures to prevent attacks

PHP servers have become the main targets of these campaigns due to the popularity of content management systems (CMS) like WordPress and Craft CMS. The exposure of these servers to misconfigurations and outdated plugins expands their attack surface. Researchers highlight that some of the methods used by attackers involve the query string ‘/?XDEBUG_SESSION_START=phpstorm’, which allows starting debugging sessions that, if left active in production environments, can facilitate the extraction of sensitive data.

Additionally, it has been observed that attackers seek credentials, API keys, and access tokens on servers exposed to the internet, and they also exploit security vulnerabilities in IoT devices. Scanning activity often originates from cloud infrastructures such as AWS and Google Cloud, highlighting how cybercriminals abuse legitimate services to conceal their true locations.

Experts warn that even low-level attackers can cause significant damage thanks to widely available exploitation tools and botnet kits. To mitigate these risks, users are advised to keep their systems updated, remove development tools in production environments, and restrict public access to their cloud infrastructure.

This surge in the capabilities of botnets is reflected in the recent classification by NETSCOUT, which identified the AISURU botnet as a new class of malware capable of launching DDoS attacks exceeding 20 terabits per second. AISURU combines DDoS attack capabilities with additional functions, allowing illicit activities such as the use of residential proxies to conceal malicious activity.

The crucial importance of identity security in the era of AI

The rapid evolution of artificial intelligence agents has transformed business security, making identity management an essential component for protecting organizations from modern threats. As these agents perform tasks autonomously and without supervision, the risk of catastrophic errors increases significantly. A failure in logic or unauthorized access can turn effective automation into an operational disaster, highlighting the vulnerability posed by poorly regulated AI implementations. The transformation of business security Currently, less than 40% of AI agents have security policies of […]

The rapid evolution of artificial intelligence agents has transformed business security, making identity management an essential component to protect organizations from modern threats. As these agents perform tasks autonomously and without supervision, the risk of catastrophic errors increases significantly. A logic failure or unauthorized access can turn effective automation into an operational disaster, highlighting the vulnerability posed by poorly regulated AI implementations.

The transformation of business security

Currently, less than 40% of AI agents have identity security policies. This leaves organizations exposed to a range of potential attacks, as these systems operate with access privileges to sensitive data. According to the SailPoint Horizons of Identity Security 2025-2026 report, the situation has become critical, as old security measures, such as firewalls, are no longer sufficient against the new identity-driven threat models.

The report highlights that 63% of organizations are at early levels of maturity in identity security, which increases their risk of attacks. Companies that implement mature identity security programs not only achieve a higher return on investment but also benefit from better operational efficiency and transformative business capabilities.

However, only 25% of organizations consider identity management as a strategic enabler. This limited view prevents many companies from harnessing the full transformative potential that identity security can offer. As the threat landscape continues to evolve, it is imperative that organizations assess their current position regarding identity security and seriously consider their readiness to manage access from automated systems and AI agents.